From 056de3de855dcdecf2a57d7209184d8f27a95067 Mon Sep 17 00:00:00 2001 From: Goby <50955360+gobysec@users.noreply.github.com> Date: Fri, 12 May 2023 18:15:39 +0800 Subject: [PATCH] Create secnet_Intelligent_Router_actpt_5g.data_Infoleakage.md add secnet_Intelligent_Router_actpt_5g.data_Infoleakage. --- ...t_Intelligent_Router_actpt_5g.data_Infoleakage.md | 12 ++++++++++++ 1 file changed, 12 insertions(+) create mode 100644 secnet_Intelligent_Router_actpt_5g.data_Infoleakage.md diff --git a/secnet_Intelligent_Router_actpt_5g.data_Infoleakage.md b/secnet_Intelligent_Router_actpt_5g.data_Infoleakage.md new file mode 100644 index 0000000..8bf5821 --- /dev/null +++ b/secnet_Intelligent_Router_actpt_5g.data_Infoleakage.md @@ -0,0 +1,12 @@ +## secnet Intelligent Router actpt_5g.data Infoleakage + +| **Vulnerability** | **secnet Intelligent Router actpt_5g.data Infoleakage** | +| :----: | :-----| +| **Chinese name** | secnet-智能路由系统 actpt_5g.data 信息泄露 | +| **CVSS core** | 7.5 | +| **FOFA Query** (click to view the results directly)| [title=\"安网-智能路由系统\" \|\| title==\"智能路由系统\" \|\| title=\"安网科技-智能路由系统\" \|\| banner=\"HTTPD_ac 1.0\" \|\| header=\"HTTPD_ac 1.0\"](https://en.fofa.info/result?qbase64=dGl0bGU9IuWuiee9kS3mmbrog73ot6%2FnlLHns7vnu58iIHx8IHRpdGxlPT0i5pm66IO96Lev55Sx57O757ufIiB8fCB0aXRsZT0i5a6J572R56eR5oqALeaZuuiDvei3r%2BeUseezu%2Be7nyIgfHwgYmFubmVyPSJIVFRQRF9hYyAxLjAiIHx8IGhlYWRlcj0iSFRUUERfYWMgMS4wIg%3D%3D) | +| **Number of assets affected** | 71768 | +| **Description** | secnet Intelligent AC management system is the wireless AP management system of Guangzhou Secure Network Communication Technology Co., LTD. (" Secure Network Communication "for short). The secnet intelligent AC management system has information vulnerabilities, which can be used by attackers to obtain sensitive information. | +| **Impact** | An attacker can use this vulnerability to obtain the WEB login account and password of the AC intelligent routing system and obtain the WEB administrator permission. As a result, sensitive information is leaked. | + +![](https://s3.bmp.ovh/imgs/2023/05/12/f8eebf0ce38f975b.gif)