1. Home
  2. Web App Vulnerabilities
  3. How to remediate – Linanto Control Web Panel (CWP) Web Interface Detection

How to remediate – Linanto Control Web Panel (CWP) Web Interface Detection

1. Introduction

The Linanto Control Web Panel (CWP) web interface has been detected on the remote host. CWP, formerly CentOS Web Panel, is a web-based control panel used to manage servers. Its presence indicates potential exposure to known vulnerabilities and attacks targeting its code base. A successful exploit could lead to unauthorized access, data breaches, or system compromise.

2. Technical Explanation

The Linanto Control Web Panel (CWP) web interface provides a remote management point for server administration. The detection of this interface indicates that the panel is accessible and potentially vulnerable to attacks exploiting known weaknesses in its code. Attackers can exploit these vulnerabilities to gain unauthorized access to the server, execute arbitrary commands, or modify system configurations.

  • Root cause: The web panel’s codebase contains security flaws due to insufficient input validation and insecure default settings.
  • Exploit mechanism: An attacker could leverage publicly available exploits to compromise the CWP interface and gain control of the underlying server. For example, an attacker might exploit a remote code execution vulnerability in the file manager module by uploading a malicious script.
  • Scope: Affected platforms are servers running Linanto Control Web Panel (CWP), formerly CentOS Web Panel. Specific versions may be more vulnerable than others; however, all installations should be considered at risk.

3. Detection and Assessment

To confirm whether a system is vulnerable, first check for the presence of the CWP web interface. Then, perform a thorough assessment to identify any potential exploits.

  • Quick checks: Access the server’s web configuration and look for a running service on ports 2086 or 2087 (default ports). Use `netstat -tulnp` to list listening services.
  • Scanning: Nessus vulnerability scanner can detect CWP with plugin ID 14935. OpenVAS also has relevant NVTs. These are examples only and may require updates.
  • Logs and evidence: Check web server access logs for requests targeting paths associated with CWP, such as `/login` or `/panel`. Look for unusual activity or error messages related to the panel’s modules.
netstat -tulnp | grep 2086

4. Solution / Remediation Steps

To fix this issue, remove the CWP web interface from the server. This is the most effective way to mitigate the risk.

4.1 Preparation

  • A change window may be required, depending on service dependencies and business impact. Approval from a senior administrator is recommended.

4.2 Implementation

  1. Step 1: Stop the CWP service using `systemctl stop cwp`.
  2. Step 2: Remove the CWP package using `yum remove centos-webpanel`.
  3. Step 3: Delete any remaining CWP files and directories from `/usr/local/cwp` or other installation locations. Use `rm -rf /usr/local/cwp` with caution.
  4. Step 4: Remove the CWP user account using `userdel cwp`.
  5. Step 5: Restart the web server (e.g., Apache or Nginx) to ensure all CWP-related processes are terminated. Use `systemctl restart httpd` or `systemctl restart nginx`.

4.3 Config or Code Example

Before

# Check for CWP service running
systemctl status cwp

After

# Verify CWP service is stopped
systemctl status cwp

4.4 Security Practices Relevant to This Vulnerability

Several security practices can help prevent this issue and similar vulnerabilities. These include least privilege, input validation, and a robust patch cadence.

  • Practice 1: Least privilege – limit user access rights to only what is necessary to reduce the impact of potential exploits.
  • Practice 2: Input validation – implement strict input validation on all web forms and API endpoints to prevent injection attacks.

4.5 Automation (Optional)

#!/bin/bash
# Script to remove CWP from server
systemctl stop cwp
yum remove centos-webpanel -y
rm -rf /usr/local/cwp
userdel cwp
systemctl restart httpd || systemctl restart nginx
echo "CWP removed successfully."

5. Verification / Validation

To confirm the fix worked, verify that the CWP service is stopped and no longer accessible through a web browser. Perform a re-test to ensure all related files and processes have been removed.

  • Post-fix check: Run `systemctl status cwp` and confirm it shows “inactive (dead)”.
  • Re-test: Access the server’s web configuration on ports 2086 or 2087. Verify that the CWP login page is no longer accessible.
  • Monitoring: Monitor web server access logs for any attempts to access CWP-related paths. An alert can be configured if requests targeting these paths are detected.
systemctl status cwp

6. Preventive Measures and Monitoring

To prevent this issue, update security baselines and implement checks in CI/CD pipelines to detect unauthorized software installations. Maintain a regular patch or configuration review cycle.

  • Baselines: Update your server security baseline to disallow the installation of unsupported control panels like CWP.
  • Pipelines: Add checks in your CI/CD pipeline to scan for unexpected packages or files on servers.
  • Asset and patch process: Implement a regular review cycle (e.g., weekly) to identify and remove unauthorized software installations.

7. Risks, Side Effects, and Roll Back

  • Risk or side effect 2: Potential downtime during service restart. Mitigation: Schedule the removal during a maintenance window with minimal impact.
  • Roll back: Restore from backup to return to the previous state. Reinstall CWP if necessary, but consider alternative server management solutions.

8. References and Resources

Updated on December 27, 2025

Was this article helpful?

Related Articles