Skip to content

Lenovo Fan Power Controller Login Panel - Detect

ID: lenovo-fp-panel

Severity: info

Author: megamansec

Tags: panel,lenovo

Lenovo Fan Power Controller login panel was detected.

id: lenovo-fp-panel
info:
name: Lenovo Fan Power Controller Login Panel - Detect
author: megamansec
severity: info
description: Lenovo Fan Power Controller login panel was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:lenovo:fan_power_controller:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: lenovo
product: fan_power_controller
shodan-query:
- http.html:"Fan and Power Controller"
- http.html:"fan and power controller"
fofa-query: body="fan and power controller"
tags: panel,lenovo
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/login.html"
stop-at-first-match: true
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Avocent Corporation and its affiliates"
- "FPC Login"
- "Fan and Power Controller"
- type: status
status:
- 200
# digest: 4a0a004730450220509181db618cb79b710a965fea9c0f380d0916a7d7501d7c434843d224cd174a022100f5b9b9fb371c5b8594909637ef9f9725f6ea1b23d06a984afa570395d9788a98:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/lenovo-fp-panel.yaml"

View on Github