Share
## https://sploitus.com/exploit?id=PACKETSTORM:190180
# Exploit Title: Ksenia Security Lares 4.0 Home Automation Default 
    Credentials
    # Google Dork: N/A
    # Date: 31 March 2025
    # Exploit Author: Mencha 'ShadeLock' Isajlovska
    # Vendor Homepage: https://www.kseniasecurity.com/en/
    # Software Link: 
    https://www.kseniasecurity.com/en/company/why-lares-4-0.html
    # Version: Lares 4.0
    # Tested on: Ksenia Lares Webserver
    # CVE : N/A
    # Desc: Ksenia Lares uses a weak set of default administrative 
    credentials
    that can be found and used to gain full control of the system.
    
    
    admin:lares
    PIN: 123456