Share
## https://sploitus.com/exploit?id=474D6E3C-62E7-510A-B8AB-493646E9B2E1
<p align="center">
    <img src="https://img.shields.io/badge/Version-v0.5.4-orange?style=for-the-badge">
      <img src="https://img.shields.io/badge/Python-3x-brightgreen?style=for-the-badge">
      <img src="https://img.shields.io/github/downloads/0xAgun/CVE-2021-40870/total?style=for-the-badge">
      <img src="https://img.shields.io/github/languages/top/0xAgun/CVE-2021-40870?style=for-the-badge">
</p>
<h1 align="center">
  <br>
    CVE-2021-40870 Exploitation
  <br>
</h1>

<h4 align="center">An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file with a dangerous type is possible, which allows an unauthenticated user to execute arbitrary code via directory traversal.</h4>


## Modules need to Install

To run this project, you will need to add the following modules in your python

`requests`
`urllib3`


## Uses

To run this project you need to do the followings

```bash
  python3 poc.py https://site.com/
```
must include / at the end of the url


## ๐Ÿ”— Links
[![twitter](https://img.shields.io/badge/twitter-1DA1F2?style=for-the-badge&logo=twitter&logoColor=white)](https://twitter.com/myselfAshraful)