Orpak Fueling Systems Exploit and Default Password
2023-12-4 05:24:55 Author: cxsecurity.com(查看原文) 阅读量:17 收藏

# Exploit Title: Orpak Fueling Systems - Google Dork and Exploit and Default Password # Date: 12/2/2023 # Exploit Author: Parsa Rezaie Khiabanloo - Parsa Rezaei khiabanloo # Vendor Homepage: Orpak (https://www.orpak.com/) # Tested on: Linux/Android(termux)/Windows Step 1 : Attacker can use this dork to find the panel intitle:"SiteOmat Loader" Step 2 : Attacker can login the panel with default password OR brute force it but sometimes default username: Admin password: Admin


文章来源: https://cxsecurity.com/issue/WLB-2023120002
如有侵权请联系:admin#unsafe.sh