From fd469095e2fe5bbe45f7a3a81c618b6952ba2f7d Mon Sep 17 00:00:00 2001 From: xiaoheihei1107 <62200676+xiaoheihei1107@users.noreply.github.com> Date: Wed, 25 Aug 2021 17:47:28 +0800 Subject: [PATCH] Add CVE-2021-3017 --- Intelbras Wireless/CVE-2021-3017/README.md | 9 +++++++++ 1 file changed, 9 insertions(+) create mode 100644 Intelbras Wireless/CVE-2021-3017/README.md diff --git a/Intelbras Wireless/CVE-2021-3017/README.md b/Intelbras Wireless/CVE-2021-3017/README.md new file mode 100644 index 0000000..d9ea602 --- /dev/null +++ b/Intelbras Wireless/CVE-2021-3017/README.md @@ -0,0 +1,9 @@ +# Intelbras Wireless Information leakage (CVE-2021-3017) + +The web interface on Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code. + +FOFA **query rule**: [title="Roteador Wireless" && body="def_wirelesspassword"](https://fofa.so/result?qbase64=dGl0bGU9IlJvdGVhZG9yIFdpcmVsZXNzIiAmJiBib2R5PSJkZWZfd2lyZWxlc3NwYXNzd29yZCI%3D) + +# Demo + +![Intelbras_Wireless_Information_leakage_CVE_2021_3017](Intelbras_Wireless_Information_leakage_CVE_2021_3017.gif)