Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Mitel Login Panel - Detect

By kannthu

Vidoc logoVidoc Module

What is the "Mitel Login Panel - Detect" module?

The "Mitel Login Panel - Detect" module is designed to detect the presence of the Mitel login panel. Mitel Networks Corporation is a software company that provides unified communications and collaboration solutions. This module focuses on identifying the login panel associated with Mitel software.

The severity of this module is classified as informative, which means it provides valuable information but does not indicate a vulnerability or misconfiguration.

This module was authored by ritikchaddha.


This module does not have a direct impact on the target system. It simply detects the presence of the Mitel login panel, providing information about the software being used.

How does the module work?

The "Mitel Login Panel - Detect" module works by sending an HTTP GET request to the "/server-common/cgi-bin/login" path. It then applies two matching conditions to determine if the Mitel login panel is present:

- The module checks the response body for the presence of the phrase "Mitel Networks Corporation". - The module verifies that the HTTP response status is 200 (OK).

If both conditions are met, the module reports a successful detection of the Mitel login panel.

Here is an example of the HTTP request sent by the module:

GET /server-common/cgi-bin/login

The matching conditions ensure that the response body contains the phrase "Mitel Networks Corporation" and the HTTP status is 200.

It's important to note that this module does not perform any actions beyond detection. It is part of a larger scanning process that utilizes multiple modules to assess the security and configuration of target systems.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: Mitel Networks Corporationand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability