Skip to content

Hongdian Default Login

ID: hongdian-default-login

Severity: high

Author: gy741

Tags: hongdian,default-login

Hongdian default login information was detected.

id: hongdian-default-login
info:
name: Hongdian Default Login
author: gy741
severity: high
description: Hongdian default login information was detected.
reference:
- https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cwe-id: CWE-522
metadata:
max-request: 4
tags: hongdian,default-login
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
Authorization: Basic {{base64(username + ':' + password)}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
- |
GET / HTTP/1.1
Host: {{Hostname}}
Authorization: Basic {{base64(username + ':' + password)}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
payloads:
username:
- guest
- admin
password:
- guest
- admin
attack: pitchfork
matchers-condition: and
matchers:
- type: word
words:
- "text/html"
part: header
- type: word
words:
- "status_main.cgi"
part: body
- type: status
status:
- 200
# digest: 4b0a0048304602210099699025873ba3f645f0c6de83a07fc18a4a4617146e11a7a33c54bd75b732dc022100bc37f0c4a5480c30efae3f5d8e1c11ed04b1dc8d0b287ff05f80ca7fc683ad0b:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/hongdian/hongdian-default-login.yaml"

View on Github