Skip to content

Yealink CTP18 - Default Login

ID: yealink-default-login

Severity: high

Author: parzival

Tags: default-login,yealink

Yealink CTP18 Default Administrator Credentials Discovered.

id: yealink-default-login
info:
name: Yealink CTP18 - Default Login
author: parzival
severity: high
description: |
Yealink CTP18 Default Administrator Credentials Discovered.
reference:
- https://support.yealink.com
metadata:
verified: true
max-request: 1
fofa-query: Yealink CTP18
tags: default-login,yealink
http:
- raw:
- |
POST /api/auth/login?p=Login&t=1 HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
Accept: application/json, text/plain, */*
username={{username}}&pwd={{password}}
attack: pitchfork
payloads:
username:
- admin
password:
- '0000'
host-redirects: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '{"ret":"ok","data":"ok"}'
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a00473045022049dcbf41fe11d365563fd3b1e7da724ed9f8bf8b43a9b62ee18acf0d58e2cfcb022100f690532701d00fc9c9a8cd979d9986907de8f3b6eeef475cd281822df6f8a8a7:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/yealink/yealink-default-login.yaml"

View on Github