Exploitation Summary
EIP tracks 1 public exploit for CVE-2007-6648. PoCs published by jackal.
AI-analyzed exploit summary This exploit demonstrates a Local File Inclusion (LFI) vulnerability in SanyBee Gallery 0.1.1 by manipulating the 'p' parameter in the URL to include arbitrary files via null byte injection.
Description
Directory traversal vulnerability in index.php in SanyBee Gallery 0.1.0 and 0.1.1 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the p parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by jackal · textwebappsphp
https://www.exploit-db.com/exploits/4816
This exploit demonstrates a Local File Inclusion (LFI) vulnerability in SanyBee Gallery 0.1.1 by manipulating the 'p' parameter in the URL to include arbitrary files via null byte injection.
Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target:
SanyBee Gallery 0.1.1
No auth needed
Prerequisites:
Target must be running SanyBee Gallery 0.1.1 · The 'p' parameter must be accessible and vulnerable to LFI
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (5)
Core 5
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28270
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/27072
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/39784
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39392
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/4816
Scores
EPSS
0.0370
EPSS Percentile
88.1%
Details
CWE
CWE-22
Status
published
Products (1)
sanybee_gallery/sanybee_gallery
0.1.1
Published
Jan 04, 2008
Tracked Since
Feb 18, 2026