This exploit demonstrates a SQL injection vulnerability in CyberCMS via the 'id' parameter in faq.php. The PoC includes a sample payload and leaked database records, confirming the vulnerability's exploitability.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:CyberCMS (version unspecified)
No auth needed
Prerequisites:Access to the target URL with the vulnerable parameter