# Exploit Title: Orpak Fueling Systems - Google Dork and Exploit and Default Password # Date: 12/2/2023 # Exploit Author: Parsa Rezaie Khiabanloo - Parsa Rezaei khiabanloo # Vendor Homepage: Orpak (https://www.orpak.com/) # Tested on: Linux/Android(termux)/Windows Step 1 : Attacker can use this dork to find the panel intitle:"SiteOmat Loader" Step 2 : Attacker can login the panel with default password OR brute force it but sometimes default username: Admin password: Admin