CVE-2008-1893

W2B Online Banking - Remote Code Execution via ilang Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-1893. PoCs published by THuM4N.

AI-analyzed exploit summary The provided text describes a remote file inclusion vulnerability in W2B Online Banking due to insufficient input sanitization. It includes a sample exploit URL but lacks executable code.

Description

PHP remote file inclusion vulnerability in index.php in W2B Online Banking allows remote attackers to execute arbitrary PHP code via a URL in the ilang parameter.

Exploits (1)

exploitdb WRITEUP VERIFIED
by THuM4N · textwebappsphp
https://www.exploit-db.com/exploits/31654

The provided text describes a remote file inclusion vulnerability in W2B Online Banking due to insufficient input sanitization. It includes a sample exploit URL but lacks executable code.

Classification
Writeup 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Theoretical
Target: W2B Online Banking
No auth needed
Prerequisites: Access to the target application · Remote file hosting location
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (3)

Core 3
Core References
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=120829213903472&w=2
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/28796
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41931

Scores

EPSS 0.0118
EPSS Percentile 78.9%

Details

CWE
CWE-94
Status published
Products (1)
w2b/online_banking
Published Apr 18, 2008
Tracked Since Feb 18, 2026