Skip to content

KLR 300N Router - Exposed Installation

ID: klr300n-install

Severity: high

Author: andreluna

Tags: keo,klr300n,misconfig,exposure,iot,install

Home router wireless KLR 300N setup page were Detected.

id: klr300n-install
info:
name: KLR 300N Router - Exposed Installation
author: andreluna
severity: high
description: |
Home router wireless KLR 300N setup page were Detected.
reference:
- http://www.keo.com.br/produtos/roteador-klr-300n
- http://www.keo.com.br/wp-content/uploads/2017/09/Manual_KLR_300N_03-17_site.pdf
metadata:
verified: true
max-request: 1
shodan-query: html:"def_wirelesspassword"
tags: keo,klr300n,misconfig,exposure,iot,install
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<title>Roteador Wireless KLR 300N</title>"
- "def_wirelesspassword"
- "Installation assitance"
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022100dd3c5dbc34240f80a9820e57248b6fdcac8082302e6c6229e7a8601116868d73022059b82de5b17bb7d4e5476a51a9c6df71cd1ac769c8ffbf28c76f889ea2be1df5:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/installer/klr300n-installer.yaml"

View on Github