This exploit demonstrates a command injection vulnerability in FTTSS <= 2.0 via the 'voz' parameter in TFLivre.php. The PoC shows how arbitrary commands can be executed through the 'exec' function due to improper input sanitization.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:FTTSS (Free Text-To-Speech System) <= 2.0
No auth needed
Prerequisites:Access to the TFLivre.php endpoint · PHP exec function enabled