Skip to content

ExacqVision Default Login

ID: exacqvision-default-login

Severity: high

Author: ELSFA7110

Tags: exacqvision,default-login

ExacqVision Web Service default login credentials (admin/admin256) were discovered.

id: exacqvision-default-login
info:
name: ExacqVision Default Login
author: ELSFA7110
severity: high
description: ExacqVision Web Service default login credentials (admin/admin256) were discovered.
reference:
- https://cdn.exacq.com/auto/manspec/files_2/exacqvision_user_manuals/web_service/exacqVision_Web_Service_Configuration_User_Manual_(version%208.8).pdf
classification:
cwe-id: cwe-798
metadata:
max-request: 1
tags: exacqvision,default-login
http:
- raw:
- |
POST /service.web HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Connection: close
action=login&u={{username}}&p={{password}}
payloads:
username:
- admin
password:
- admin256
attack: pitchfork
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: header
words:
- "application/json"
- type: word
part: body
condition: and
words:
- '"auth":'
- '"success": true'
# digest: 4b0a00483046022100d7da495a0b90b2f2e7707c5496ad7ec18cb915c76c30353d345831e732b28a410221009a87ef7ccc7913e0761c95a899339b780fb77ea50977575274f2d222e74778e2:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/exacqvision/exacqvision-default-login.yaml"

View on Github