Skip to content

Allnet - Default Login

ID: allnet-default-login

Severity: high

Author: ritikchaddha

Tags: default-login,allnet

Allnet contains a default login vulnerability. Default admin login password ‘admin’ was found.

id: allnet-default-login
info:
name: Allnet - Default Login
author: ritikchaddha
severity: high
description: |
Allnet contains a default login vulnerability. Default admin login password 'admin' was found.
metadata:
verified: true
max-request: 2
shodan-query: http.favicon.hash:-121681558
tags: default-login,allnet
http:
- raw:
- |
POST /cgi-bin/dispatcher.cgi?cmd=1 HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
username={{username}}&password={{password}}&login=1
- |
POST /cgi-bin/dispatcher.cgi?cmd=3 HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
username={{username}}&password={{password}}&login=1
stop-at-first-match: true
attack: pitchfork
payloads:
username:
- admin
password:
- admin
matchers-condition: and
matchers:
- type: word
part: body
words:
- '>LOGOUT</a>'
- 'REBOOT</a>'
condition: and
- type: status
status:
- 200
# digest: 4b0a0048304602210097b09e40a032b95d0f6fae62f6e7dcbe3df93983070208cd268944333f4fef5a0221009ca8bcc5d0fc785e7582ca49f3be1552322c8a5988e76e41a9574725c24376a5:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/allnet/allnet-default-login.yaml"

View on Github