Skip to content

Commit f48b29d

Browse files
Merge pull request #11716 from projectdiscovery/CVE-2024-54763
Create CVE-2024-54763.yaml
2 parents cdf1f49 + 251974e commit f48b29d

File tree

1 file changed

+44
-0
lines changed

1 file changed

+44
-0
lines changed

http/cves/2024/CVE-2024-54763.yaml

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
id: CVE-2024-54763
2+
3+
info:
4+
name: ipTIME A2004 - Unauthorized Access
5+
author: ritikchaddha
6+
severity: medium
7+
description: |
8+
An access control issue in the component /login/hostinfo.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication.
9+
reference:
10+
- https://github.com/Shuanunio/CVE_Requests/blob/main/ipTIME/A2004/ipTIME_A2004_unauthorized_access_vulnerability_first.md
11+
- https://nvd.nist.gov/vuln/detail/CVE-2024-54763
12+
classification:
13+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
14+
cvss-score: 5.3
15+
cve-id: CVE-2024-54763
16+
cwe-id: CWE-284
17+
metadata:
18+
verified: true
19+
max-request: 1
20+
vendor: ipTIME
21+
product: A2004
22+
shodan-query: http.title:"ipTIME"
23+
fofa-query: title="ipTIME"
24+
tags: cve,cve2024,iptime,router,unauth,exposure
25+
26+
http:
27+
- method: GET
28+
path:
29+
- "{{BaseURL}}/login/hostinfo.cgi"
30+
31+
matchers-condition: and
32+
matchers:
33+
- type: regex
34+
regex:
35+
- "^ipTIME"
36+
37+
- type: word
38+
part: content_type
39+
words:
40+
- "text/plain"
41+
42+
- type: status
43+
status:
44+
- 200

0 commit comments

Comments
 (0)