This exploit demonstrates a SQL injection vulnerability in Maian Survey v1.1 via the 'survey' parameter in the 'cmd=surveys' endpoint. The PoC provides a direct URL for exploitation, indicating a functional and straightforward attack vector.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Maian Survey v1.1
No auth needed
Prerequisites:Access to the target application URL