http:
Found one login page here.

Default password like admin:admin didn't work here.
On doing google search for pyload exploit. I found one pre-authentication exploit.

The command didn't give any output after running, so I cannot confirm whether it ran or not.

Let's try getting shell.

Other exploit.
Let's try this.

Start the listener at port 80.
Run the exploit.

GOt the shell as root user.

Last updated
Was this helpful?