Skip to content

Ruckus Wireless Unleashed Login Panel - Detect

ID: ruckus-unleashed-panel

Severity: info

Author: idealphase

Tags: panel,ruckus,ruckuswireless

Ruckus Wireless Unleashed login panel was detected.

id: ruckus-unleashed-panel
info:
name: Ruckus Wireless Unleashed Login Panel - Detect
author: idealphase
severity: info
description: Ruckus Wireless Unleashed login panel was detected.
reference:
- https://www.commscope.com/ruckus/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:o:ruckuswireless:unleashed_firmware:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: ruckuswireless
product: unleashed_firmware
shodan-query:
- http.title:"Unleashed Login"
- http.title:"unleashed login"
google-query:
- intitle:"Unleashed Login"
- intitle:"unleashed login"
fofa-query: title="unleashed login"
tags: panel,ruckus,ruckuswireless
http:
- method: GET
path:
- "{{BaseURL}}/admin/login.jsp"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<title>Unleashed Login</title>"
- type: status
status:
- 200
extractors:
- type: regex
group: 1
regex:
- '<link href="css\/font-awesome\.min\.css\?(.+)" rel="stylesheet">'
# digest: 490a0046304402205c6ae8d1fc0d511c762d7d6fde1d6caadd09c9c4040ccd6c67a7f3a9b8f9cd170220480e98aff2cfb24ef15d01a6dc0673c7537a912ec7290f84244d866b9ab934a5:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/ruckus-unleashed-panel.yaml"

View on Github