## https://sploitus.com/exploit?id=474D6E3C-62E7-510A-B8AB-493646E9B2E1
<p align="center">
<img src="https://img.shields.io/badge/Version-v0.5.4-orange?style=for-the-badge">
<img src="https://img.shields.io/badge/Python-3x-brightgreen?style=for-the-badge">
<img src="https://img.shields.io/github/downloads/0xAgun/CVE-2021-40870/total?style=for-the-badge">
<img src="https://img.shields.io/github/languages/top/0xAgun/CVE-2021-40870?style=for-the-badge">
</p>
<h1 align="center">
<br>
CVE-2021-40870 Exploitation
<br>
</h1>
<h4 align="center">An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file with a dangerous type is possible, which allows an unauthenticated user to execute arbitrary code via directory traversal.</h4>
## Modules need to Install
To run this project, you will need to add the following modules in your python
`requests`
`urllib3`
## Uses
To run this project you need to do the followings
```bash
python3 poc.py https://site.com/
```
must include / at the end of the url
## ๐ Links
[![twitter](https://img.shields.io/badge/twitter-1DA1F2?style=for-the-badge&logo=twitter&logoColor=white)](https://twitter.com/myselfAshraful)