# Exploit Title: Orpak Fueling Systems - Google Dork and Exploit and Default Password
# Date: 12/2/2023
# Exploit Author: Parsa Rezaie Khiabanloo - Parsa Rezaei khiabanloo
# Vendor Homepage: Orpak (https://www.orpak.com/)
# Tested on: Linux/Android(termux)/Windows

Step 1 : Attacker can use this dork  to find the panel

intitle:"SiteOmat Loader"

Step 2 : Attacker can login the panel with default password OR brute force it but sometimes default

username: Admin

password: Admin