This exploit demonstrates a SQL injection vulnerability in Muviko Video CMS v1.0 via the 'q' parameter in search.php. It includes a payload example and sqlmap usage to exploit the UNION-based SQLi.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Muviko Video CMS v1.0
No auth needed
Prerequisites:Access to the vulnerable search.php endpoint