Advertisement






Orpak Fueling Systems Exploit and Default Password

CVE Category Price Severity
N/A CWE-XX N/A High
Author Risk Exploitation Type Date
Unknown High Remote 2023-12-03
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023120002

Below is a copy:

Orpak Fueling Systems Exploit and Default Password
# Exploit Title: Orpak Fueling Systems - Google Dork and Exploit and Default Password
# Date: 12/2/2023
# Exploit Author: Parsa Rezaie Khiabanloo - Parsa Rezaei khiabanloo
# Vendor Homepage: Orpak (https://www.orpak.com/)
# Tested on: Linux/Android(termux)/Windows

Step 1 : Attacker can use this dork  to find the panel

intitle:"SiteOmat Loader"

Step 2 : Attacker can login the panel with default password OR brute force it but sometimes default

username: Admin

password: Admin

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.