header-logo
Suggest Exploit
vendor:
ImageVue
by:
Sora
7.5
CVSS
HIGH
Remote Admin Login Exploit
287
CWE
Product Name: ImageVue
Affected Version From: 2
Affected Version To: 2
Patch Exists: NO
Related CWE: N/A
CPE: a:imagevue:imagevue:2.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows and Linux
2020

ImageVue 2.0 Remote Admin Login Exploit

ImageVue 2.0 suffers a remote admin login exploit. You can simply enter admin as the password and it will log you in as a global administrator.

Mitigation:

Enforce strong passwords and two-factor authentication for admin accounts.
Source

Exploit-DB raw data:

# Author: Sora
# Software Link: http://www.imagevuex.com/
# Version: 2.0
# Tested on: Windows and Linux
---------------------------------
/*
ImageVue 2.0 Remote Admin Login Exploit
Created by Sora
Contact: vhr95zw [at] hotmail.com
*/

[+] Google Dork: "inurl:/admin/" "ImageVue"

[+] Description:
ImageVue 2.0 suffers a remote admin login exploit.

# Code: You can simply enter admin as the password and it will log you in as a global administrator.

# Greetz: Bw0mp, Popc0rn, Xermes, T3eS, Timeb0mb, [H]aruhiSuzumiya, Max Mafiotu, and Revelation!

[ EOF ]