Subscribe via feed.

Ajenti 2.1.31 Command Injection

Posted by deepcore on December 3, 2019 – 5:30 pm

This Metasploit module exploits a command injection in Ajenti version 2.1.31. By injecting a command into the username POST parameter to api/core/auth, a shell can be spawned.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.