## https://sploitus.com/exploit?id=PACKETSTORM:190180
# Exploit Title: Ksenia Security Lares 4.0 Home Automation Default
Credentials
# Google Dork: N/A
# Date: 31 March 2025
# Exploit Author: Mencha 'ShadeLock' Isajlovska
# Vendor Homepage: https://www.kseniasecurity.com/en/
# Software Link:
https://www.kseniasecurity.com/en/company/why-lares-4-0.html
# Version: Lares 4.0
# Tested on: Ksenia Lares Webserver
# CVE : N/A
# Desc: Ksenia Lares uses a weak set of default administrative
credentials
that can be found and used to gain full control of the system.
admin:lares
PIN: 123456