CVE-2008-1893
W2B Online Banking - Remote Code Execution via ilang Parameter
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2008-1893. PoCs published by THuM4N.
AI-analyzed exploit summary The provided text describes a remote file inclusion vulnerability in W2B Online Banking due to insufficient input sanitization. It includes a sample exploit URL but lacks executable code.
Description
PHP remote file inclusion vulnerability in index.php in W2B Online Banking allows remote attackers to execute arbitrary PHP code via a URL in the ilang parameter.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by THuM4N · textwebappsphp
https://www.exploit-db.com/exploits/31654
The provided text describes a remote file inclusion vulnerability in W2B Online Banking due to insufficient input sanitization. It includes a sample exploit URL but lacks executable code.
Classification
Writeup 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Theoretical
Target:
W2B Online Banking
No auth needed
Prerequisites:
Access to the target application · Remote file hosting location
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (3)
Core 3
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=120829213903472&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/28796
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41931
Scores
EPSS
0.0118
EPSS Percentile
78.9%
Details
CWE
CWE-94
Status
published
Products (1)
w2b/online_banking
Published
Apr 18, 2008
Tracked Since
Feb 18, 2026