SiteOmat Fueling System - Default Password

2024.03.16
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: SiteOmat Fueling System - Default Password # Date: 2024-03-15 # Exploit Author: Parsa rezaie khiabanloo # Vendor Homepage: https://www.orpak.com/ # Tested on: Windows,Linux # Google Dork : intitle:"SiteOmat Loader" # Shodan Dork : Server: Orpak # Attacker with this google dork can find the login panel and put the default username and password. Username : Admin password : Admin # PoC : https://207.244.206.37/login.htm Disclaimer: The information provided in this advisory is provided "as is" without warranty of any kind. Trustwave disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Trustwave or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Trustwave or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top