MikroTik Router OS Login Panel - Detect
ID: mikrotik-routeros
Severity: info
Author: gy741
Tags: panel,login,mikrotik
Description
Section titled “Description”MikroTik Router OS login panel was detected.
YAML Source
Section titled “YAML Source”id: mikrotik-routeros
info: name: MikroTik Router OS Login Panel - Detect author: gy741 severity: info description: MikroTik Router OS login panel was detected. reference: - https://systemweakness.com/routeros-user-with-just-ftp-policy-can-write-to-filesystem-cve-2021-27221-e3e45d780dfe classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cwe-id: CWE-200 cpe: cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: mikrotik product: routeros shodan-query: http.title:"mikrotik routeros > administration" fofa-query: title="mikrotik routeros > administration" google-query: intitle:"mikrotik routeros > administration" tags: panel,login,mikrotik
http: - method: GET path: - '{{BaseURL}}'
matchers-condition: and matchers: - type: word words: - 'If this device is not in your possession, please contact your local network administrator' - '.mikrotik.com' condition: and
- type: word name: router-old part: body words: - '<title>mikrotik routeros > administration</title>' - '<title>Mikrotik Router' - '<img src="/webcfg/' - '<title>MikroTik RouterOS Managing Webpage</title>' condition: or
- type: word name: hotspot part: body words: - 'Please log on to use the mikrotik hotspot service' - 'mikrotik hotspot > login' condition: and
- type: word name: mikrotik-httpproxy part: header words: - "Server: mikrotik httpproxy"
extractors: - type: regex group: 1 regex: - "<h1>RouterOS (.+)</h1>" - '<div class="top">mikrotik routeros (.[0-9.]+) configuration page</div>' - 'routeros (.[0-9.]+) ' - '<b>MikroTik RouterOS (.[0-9.]+)</b>'# digest: 4b0a00483046022100ba53e5f294d91eaa84a3bd441546a80ff42d9256dc6097e2c072149c13ca5d3402210080440e0a6c8e37974113195bda0787c9601fda27827fbce53a6522a89fafe468:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/exposed-panels/mikrotik/mikrotik-routeros.yaml"