## https://sploitus.com/exploit?id=CC978298-06C5-5F0B-A858-372687BB222E
# Lexmark-RCE
This is a modified version of a Lexmark RCE exploit. The revised version utilizes a bind shell instead of a reverse shell by starting a listener on the target and then connecting to it, using port 8080 by default. The exploit targets Lexmark CVE-2023-26067.
## Overview
Having encountered issues with callback setups using a reverse connection, this version addresses the challenge by incorporating a bind shell.
## Credits and Forked Repository
This repository is forked and modified from the original work available at [horizon3ai/CVE-2023-26067](https://github.com/horizon3ai/CVE-2023-26067/tree/main). Special thanks to the creators for the heavy lifting.
## CVE Details
For detailed information on the CVE (Common Vulnerabilities and Exposures) covered by this exploit, refer to the original repository: [CVE-2023-26067](https://github.com/horizon3ai/CVE-2023-26067/tree/main).
## How to Use
1. Clone this repository.
```bash
git clone https://github.com/YourUsername/Lexmark-RCE.git
1. Run the exploit.
```bash
python3 bind_shell.py -t <IP> -p <PORT>