Enhancement: network/backdoor/backdoored-zte.yaml by md
parent
f0a4b96eaa
commit
56ffd6e01a
|
@ -1,11 +1,11 @@
|
||||||
id: backdoored-zte
|
id: backdoored-zte
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Backdoored ZTE Routers
|
name: ZTE Router Panel - Detect
|
||||||
author: its0x08
|
author: its0x08
|
||||||
severity: high
|
severity: high
|
||||||
description: |
|
description: |
|
||||||
Multiple ZTE routers have a telnet hardcoded backdoor account that spawns root shell.
|
Multiple ZTE router panels were detected. These routers have a telnet-hardcoded backdoor account that spawns root shell.
|
||||||
reference:
|
reference:
|
||||||
- https://www.exploit-db.com/ghdb/7179
|
- https://www.exploit-db.com/ghdb/7179
|
||||||
metadata:
|
metadata:
|
||||||
|
@ -32,3 +32,5 @@ network:
|
||||||
- type: regex
|
- type: regex
|
||||||
regex:
|
regex:
|
||||||
- '[A-Z]{1,}[0-9]{3,4}'
|
- '[A-Z]{1,}[0-9]{3,4}'
|
||||||
|
|
||||||
|
# Enhanced by md on 2023/03/22
|
||||||
|
|
Loading…
Reference in New Issue