Subscribe via feed.

Sage X3 Administration Service Authentication Bypass / Command Execution

Posted by deepcore on July 22, 2021 – 4:37 am

This Metasploit module leverages an authentication bypass exploit within Sage X3 AdxSrv’s administration protocol to execute arbitrary commands as SYSTEM against a Sage X3 Server running an available AdxAdmin service.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.