From cce0d2a20164335bdce9650e9d4683411f0e9b5c Mon Sep 17 00:00:00 2001 From: Goby <50955360+gobysec@users.noreply.github.com> Date: Mon, 16 May 2022 11:36:56 +0800 Subject: [PATCH] Update README.md fix --- Zyxel/CVE-2022-30525/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Zyxel/CVE-2022-30525/README.md b/Zyxel/CVE-2022-30525/README.md index 2b59f9b..d8c07dd 100644 --- a/Zyxel/CVE-2022-30525/README.md +++ b/Zyxel/CVE-2022-30525/README.md @@ -3,7 +3,7 @@ Several firewalls, such as the Zyxel ATP series, VPN series, and USG FLEX series, have security vulnerabilities. An unauthenticated remote attacker could execute arbitrary code on the affected device as the user nobody, taking control of the server. -FOFA **query rule**: [title="USG FLEX" || title="USG20-VPN" || title="USG20W-VPN" || title="ATP100" || title="ATP200" || title="ATP500"title="ATP700" || title="ATP800"](https://fofa.info/result?qbase64=dGl0bGU9IlVTRyBGTEVYIiB8fCB0aXRsZT0iVVNHMjAtVlBOIiB8fCB0aXRsZT0iVVNHMjBXLVZQTiIgfHwgdGl0bGU9IkFUUDEwMCIgfHwgdGl0bGU9IkFUUDIwMCIgfHwgdGl0bGU9IkFUUDUwMCJ0aXRsZT0iQVRQNzAwIiB8fCB0aXRsZT0iQVRQODAwIg%3D%3D) +FOFA **query rule**: [title="USG FLEX" || title="USG20-VPN" || title="USG20W-VPN" || title="ATP100" || title="ATP200" || title="ATP500" || title="ATP700" || title="ATP800"](https://fofa.info/result?qbase64=dGl0bGU9IlVTRyBGTEVYIiB8fCB0aXRsZT0iVVNHMjAtVlBOIiB8fCB0aXRsZT0iVVNHMjBXLVZQTiIgfHwgdGl0bGU9IkFUUDEwMCIgfHwgdGl0bGU9IkFUUDIwMCIgfHwgdGl0bGU9IkFUUDUwMCIgfHwgdGl0bGU9IkFUUDcwMCIgfHwgdGl0bGU9IkFUUDgwMCI%3D) # Demo