Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
CVE-2020-255521 | CWE-22 | $5000 | Critical |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
Unknown | High | Remote | 2021-08-11 |
CVSS | EPSS | EPSSP |
---|---|---|
CVSS:7.2/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H | 0.02192 | 0.50148 |
# Exploit Title: MobinNet Router- Remote Code Execution (PoC) # Google Dork: In Shodan search engine, the filter is mobinnet country:"ir" # Date: 2021-08-11 # Exploit Author: Aryan Chehreghani # Vendor Homepage: https://mobinnet.ir # Version: N/A # Tested on: Windows 10 #About-Mobinnet #Dedicated Internet services, extensive communication networks and managed Internet, as well as a wide range of #data center services such as virtual and dedicated servers. In recent years, IoT-based services and cloud computing #have been added to Mobinnet's product portfolio, creating integrated services in the field of home, office and #organization services. #POC #1.Find Targets With (mobinnet country:"ir) ==> SHODAN Filter #2.Download Form App (.exe) File #4.Copy IP And Port Targets #5.paste ip & port in textbox and Enter CMD => For Example ( ls ) #Proof of Concept: #Github : https://github.com/TAPESH-TEAM/MobinNet-RCE
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.