Advertisement






SiteOmat Fueling System - Default Password

CVE Category Price Severity
CVE-2021-12345 CWE-798 $5000 Critical
Author Risk Exploitation Type Date
SecurityResearcherX High Remote 2024-03-16
CPE
cpe:/a:siteomat:fueling_system
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2024030031

Below is a copy:

SiteOmat Fueling System - Default Password
# Exploit Title: SiteOmat Fueling System - Default Password
# Date: 2024-03-15
# Exploit Author: Parsa rezaie khiabanloo
# Vendor Homepage: https://www.orpak.com/
# Tested on: Windows,Linux
# Google Dork : intitle:"SiteOmat Loader"
# Shodan Dork : Server: Orpak
# Attacker with this google dork can find the login panel and put the default username and password.

Username : Admin
password : Admin

# PoC : https://207.244.206.37/login.htm

Disclaimer:
The information provided in this advisory is provided "as is" without
warranty of any kind. Trustwave disclaims all warranties, either express or
implied, including the warranties of merchantability and fitness for a
particular purpose. In no event shall Trustwave or its suppliers be liable
for any damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages, even if
Trustwave or its suppliers have been advised of the possibility of such
damages. Some states do not allow the exclusion or limitation of liability
for consequential or incidental damages so the foregoing limitation may not
apply.
          

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.