mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 15:53:33 +08:00
Update CVE-2023-41109.yaml
This commit is contained in:
committed by
Dhiyaneshwaran
parent
34ebf3e7c2
commit
9853c32a32
@@ -10,7 +10,7 @@ info:
|
||||
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the affected device.
|
||||
remediation: |
|
||||
Apply the latest firmware update provided by the vendor to mitigate this vulnerability.
|
||||
reference:-
|
||||
reference:
|
||||
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-019.txt
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2023-41109
|
||||
- http://packetstormsecurity.com/files/175945/SmartNode-SN200-3.21.2-23021-OS-Command-Injection.html
|
||||
@@ -30,6 +30,7 @@ info:
|
||||
vendor: patton
|
||||
product: smartnode_sn200
|
||||
tags: cve,cve2023,smartnode,voip,patton,vkev,vuln
|
||||
|
||||
variables:
|
||||
payload: "echo CVE-2023-41109 | md5sum"
|
||||
|
||||
@@ -46,5 +47,4 @@ http:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "dd556350275e2ee0a2e877cea9c8a74a"
|
||||
# digest: 4a0a004730450221008cd03e0df664ea52cd10b21015e3ce00a1aa115d3ad737d73b607de60bd55f7e022006c77b3df2a2e02b6b090549a4975c7a9193e1afb3198ae4970bc02c2bdf0e7f:922c64590222798bb761d5b6d8e72950
|
||||
- "dd556350275e2ee0a2e877cea9c8a74a"
|
||||
Reference in New Issue
Block a user