Add detection patterns for latest actively exploited vulnerabilities: - CVE-2025-55182 (React2Shell, CVSS 10.0) - CVE-2025-8110 (Gogs RCE), CVE-2025-53770 (SharePoint) - CVE-2025-52691 (SmarterMail), CVE-2025-40551 (SolarWinds) - CVE-2024-47575 (FortiManager), CVE-2024-21887 (Ivanti) - CVE-2024-3400, CVE-2024-0012, CVE-2024-9474 (PAN-OS) New attack categories based on OWASP Top 10 2025: - HTTP Request Smuggling (TE.CL/CL.TE conflicts) - AI/LLM Prompt Injection (ChatML, instruction markers) - WAF Bypass techniques (Unicode normalization, double encoding) - Supply Chain attacks (CI/CD poisoning, dependency confusion) - Extended SSTI (Jinja2, Freemarker, Velocity, Thymeleaf) - API Abuse (BOLA/IDOR, mass assignment) CrowdSec scenarios split into 11 separate files for reliability. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> |
||
|---|---|---|
| .. | ||
| htdocs/luci-static/resources | ||
| root/usr | ||
| Makefile | ||
| README.md | ||
LuCI Glances Dashboard
System monitoring dashboard powered by Glances with embedded Web UI.
Installation
opkg install luci-app-glances
Access
LuCI menu: SecuBox -> Monitoring -> Glances
Tabs
- Dashboard -- CPU, memory, disk, and network metrics at a glance
- Web UI -- Embedded Glances web interface with SecuBox theme
- Settings -- Monitoring intervals, alert thresholds, service control
RPCD Methods
Backend: luci.glances
| Method | Description |
|---|---|
get_status |
Service status and basic metrics |
get_config |
Get Glances configuration |
get_monitoring_config |
Get monitoring parameters |
get_alerts_config |
Get alert threshold settings |
get_web_url |
Get Glances Web UI URL |
service_start |
Start Glances |
service_stop |
Stop Glances |
service_restart |
Restart Glances |
set_config |
Update a configuration key |
Dependencies
luci-basesecubox-app-glances
License
Apache-2.0