This exploit leverages a file write vulnerability in w-CMS 2.0.1 via the `procActivity` function, allowing arbitrary PHP code injection through the `type` and `content` parameters. The PoC demonstrates remote code execution by writing a shell to `/public/shell.php`.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:w-CMS 2.0.1
No auth needed
Prerequisites:Target must be running w-CMS 2.0.1 · The `/public/` directory must be writable