This exploit demonstrates SQL injection vulnerabilities in GLink Word Link Script v1.2.3, allowing unauthorized access to admin credentials via crafted SQL queries in the 'id', 'gid', and 'wid' parameters.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:GLink Word Link Script v1.2.3
No auth needed
Prerequisites:Access to the vulnerable web application