Skip to content

ESPEasy Mega Panel Exposure

ID: espeasy-mega-exposure

Severity: high

Author: ritikchaddha

Tags: misconfig,espeasy,exposure

ESPEasy Mega Panel is exposed.

id: espeasy-mega-exposure
info:
name: ESPEasy Mega Panel Exposure
author: ritikchaddha
severity: high
description: ESPEasy Mega Panel is exposed.
metadata:
verified: true
max-request: 1
shodan-query: http.html:"ESP Easy Mega"
tags: misconfig,espeasy,exposure
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "ESP Easy Mega:"
- "Config"
- "Tools"
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022077c9c4582be8c24c0bf3fde9306a49ce04577dd2f5b4527d4828bb7ce6234535022100c1d700bfcbacb358f2515c75a2cba43460d7c41cc7ce9c09f494c70a8d829197:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/espeasy-mega-exposure.yaml"

View on Github