The exploit allows an attacker to craft a link that, when visited by an admin, triggers a cross-site scripting (XSS) vulnerability on WonderCMS version 4.3.2. This XSS vulnerability is then leveraged to remotely execute malicious code on the server, enabling the attacker to take control of the system. This exploit script generates a JavaScript file that, when loaded by the admin, sets up a reverse shell to the attacker's specified IP address and port.
The DataCube3 v1.0 software is vulnerable to an unrestricted file upload vulnerability that can lead to remote code execution. An attacker can exploit this to upload malicious files to the server, potentially allowing them to execute arbitrary commands. This exploit also includes a reverse shell chain and information disclosure, such as leaking root passwords.
The exploit allows an attacker to include local files on the server by manipulating the application domain and providing a local file path. This vulnerability has been assigned the CVE-2023-3643.
GL.iNet version 3.216 is vulnerable to remote code execution via the OpenVPN client. An attacker can exploit this vulnerability by adding a malicious configuration file or client, allowing them to execute arbitrary code on the target system. This vulnerability is identified as CVE-2023-46456.
The GL.iNet <= 4.3.7 allows an attacker to write arbitrary files. By crafting a specific shadow file and replacing it using the exploit script, the attacker can write to the '/etc/shadow' file. This vulnerability has been assigned CVE-2023-46455.
This exploit targets a vulnerability in Atlassian Confluence servers that allows an attacker to bypass authentication. By sending a specially crafted request, an attacker can create a new admin account without requiring authentication on the targeted Atlassian server.
The exploit allows an attacker to establish a reverse shell connection on systems running OSGi v3.7.2 or earlier.
Multiple SQL injection vulnerabilities were found in Customer Support System 1.0, specifically in the /customer_support/ajax.php?action=save_ticket endpoint. Authenticated attackers can exploit these vulnerabilities to execute arbitrary SQL commands by manipulating parameters like department_id, customer_id, and subject.
The TPC-110W device is vulnerable to remote command execution due to improper input validation. An attacker can exploit this vulnerability by sending a specially crafted request to the device, allowing them to execute arbitrary commands with root privileges. This vulnerability has been assigned CVE-2021-XXXXX.
The exploit allows an unauthenticated user to traverse directories and access sensitive system files like /etc/shadow on TP-Link TL-WR740N version 3.12.11 Build 110915 Rel.40896n. This vulnerability could lead to unauthorized access to critical system information.