Orpak Fueling Systems Exploit and Default Password

2023.12.03
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: Orpak Fueling Systems - Google Dork and Exploit and Default Password # Date: 12/2/2023 # Exploit Author: Parsa Rezaie Khiabanloo - Parsa Rezaei khiabanloo # Vendor Homepage: Orpak (https://www.orpak.com/) # Tested on: Linux/Android(termux)/Windows Step 1 : Attacker can use this dork to find the panel intitle:"SiteOmat Loader" Step 2 : Attacker can login the panel with default password OR brute force it but sometimes default username: Admin password: Admin


Vote for this issue:
0%
100%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top