
13 changes to exploits/shellcodes/ghdb TEM Opera Plus FM Family Transmitter 35.45 - Remote Code Execution TEM Opera Plus FM Family Transmitter 35.45 - XSRF Executables Created with perl2exe < V30.10C - Arbitrary Code Execution Atlassian Confluence Data Center and Server - Authentication Bypass (Metasploit) Automatic-Systems SOC FL9600 FastLine - Directory Transversal Automatic-Systems SOC FL9600 FastLine - The device contains hardcoded login and password for super admin dawa-pharma 1.0-2022 - Multiple-SQLi Moodle 4.3 - Insecure Direct Object Reference Moodle 4.3 - Reflected XSS SuperStoreFinder - Multiple Vulnerabilities Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE) Zoo Management System 1.0 - Unauthenticated RCE
16 lines
No EOL
718 B
Text
16 lines
No EOL
718 B
Text
# Exploit Title: Automatic-Systems SOC FL9600 FastLine - The device contains hardcoded login and password for super admin
|
|
# Google Dork:
|
|
# Date: 12/9/2023
|
|
# Exploit Author: Mike Jankowski-Lorek, Marcin Kozlowski / Cqure
|
|
# Vendor Homepage: http://automatic-systems.com
|
|
# Software Link:
|
|
# Version: V06
|
|
# Tested on: V06, VersionSVN = 28569_8a99acbd8d7ea09a57d5fbcb435da5427b3f6b8a
|
|
# CVE : CVE-2023-37608
|
|
|
|
An issue in Automatic Systems SOC FL9600 FastLine version:V06 a remote attacker to obtain sensitive information via the admin login credentials.
|
|
|
|
The device contains hardcoded login and password for super admin. The administrator cannot change the password for this account.
|
|
|
|
Login: automaticsystems
|
|
Password: astech |