Skip to content

Tasmota Configuration Exposure

ID: tasmota-config-webui

Severity: medium

Author: ritikchaddha

Tags: misconfig,tasmota,exposure,config

Tasmota configuration is exposed.

id: tasmota-config-webui
info:
name: Tasmota Configuration Exposure
author: ritikchaddha
severity: medium
description: Tasmota configuration is exposed.
reference:
- https://github.com/arendst/Tasmota
classification:
cpe: cpe:2.3:o:tasmota_project:tasmota:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: tasmota_project
product: tasmota
shodan-query: title:"Tasmota"
tags: misconfig,tasmota,exposure,config
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: or
matchers:
- type: word
part: body
words:
- "Firmware"
- "Tasmota"
condition: and
case-insensitive: true
- type: word
part: body
words:
- "Theo Arends"
- "<h2>Tasmota</h2>"
condition: and
case-insensitive: true
extractors:
- type: regex
part: body
group: 1
regex:
- "Tasmota ([0-9.]+) "
# digest: 4a0a00473045022053181f0ceaf3f34b31fcd5696b81ebfda1739ec9eec1fe119277b468f78fe14e022100d90fef2dbe8e8830086ffb6d228a43dc326438546676e30e77160472cf412e80:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/tasmota-config-webui.yaml"

View on Github