Share
## https://sploitus.com/exploit?id=CC978298-06C5-5F0B-A858-372687BB222E
# Lexmark-RCE

This is a modified version of a Lexmark RCE exploit. The revised version utilizes a bind shell instead of a reverse shell by starting a listener on the target and then connecting to it, using port 8080 by default. The exploit targets Lexmark CVE-2023-26067.

## Overview

Having encountered issues with callback setups using a reverse connection, this version addresses the challenge by incorporating a bind shell.

## Credits and Forked Repository

This repository is forked and modified from the original work available at [horizon3ai/CVE-2023-26067](https://github.com/horizon3ai/CVE-2023-26067/tree/main). Special thanks to the creators for the heavy lifting.

## CVE Details

For detailed information on the CVE (Common Vulnerabilities and Exposures) covered by this exploit, refer to the original repository: [CVE-2023-26067](https://github.com/horizon3ai/CVE-2023-26067/tree/main).

## How to Use

1. Clone this repository.
   ```bash
   git clone https://github.com/YourUsername/Lexmark-RCE.git
1. Run the exploit.
   ```bash
   python3 bind_shell.py -t <IP> -p <PORT>