## https://sploitus.com/exploit?id=2BFC2609-BF7F-5C2D-A373-61AF9D995927
# wago_exploit.py - PoC Exploit for CVE-2023-1698




## ๐ About
**wago_exploit.py** is a proof-of-concept (PoC) exploit for **CVE-2023-1698**, a critical vulnerability affecting **WAGO PLCs**. This exploit grants the attacker **shell access** to the device, potentially exposing sensitive operations.
> **โ ๏ธ Disclaimer:** This repository is for educational and research purposes only. Unauthorized use may be illegal. Use responsibly.
## ๐ก๏ธ Mitigation
To protect against this exploit:
Patch your firmware: Ensure you are running the latest firmware version from WAGO.
Network segmentation: Restrict access to PLCs from untrusted networks.
Firewall rules: Block unauthorized access to vulnerable endpoints.

## ๐ Requirements
- Python 3.x
- `requests` library
- Network access to the target WAGO PLC
Install dependencies & Usage ๐ฏ:
```bash
git clone https://github.com/X3RX3SSec/CVE-2023-1698
cd CVE-2023-1698
pip install requirements.txt
python3 wago_exploit.py -u http://IP:PORT