This exploit targets a remote code execution vulnerability in Witbe's applyConfig.pl CGI script. It sends a crafted HTTP request with a payload that executes a reverse shell via bash, connecting back to the attacker's specified host and port.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:Witbe (version unspecified)
No auth needed
Prerequisites:Network access to the target · Target must have bash and netcat-like functionality