Edit Report

Our sensors found this exploit at:

Below is a copy:

OPSTECH Thailand Gov Management System Multiple Vulnerabilities
# Exploit Title: OPSTECH Thailand Government Management System Multiple Attack (SQLi + Default weak password)
# Google Dork: 1. intext:"Copyright  by OPSTECH All Right Reserved"
                        2. USE your Brain..
# Vulnerabilty: SQL Injection + Default Weak Admin Password
# Date: 2016-06-23
# Risk: High
# Original Exploit Author: ./NaughtySec - Indinesia Bug Hunter  
# Vendor Homepage:
# Version: = all version vuln
# Tested on: Kali Linux 2022.2 & Windows 11
# Tested Environment - Ubuntu Server 20.04 LTS
# Attacking video :

First found it in 2016, but after a long time and accidentally looked at the mirror again and tried the exploit again, it's still working until now

Video for attacking

Admin Login: 

Default Admin password: 


Hash MD5

Copyright ©2022 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.