Codiad 2.8.4 allows remote authenticated administrators to execute arbitrary code by uploading an executable file.
An authenticated attacker can upload an executable file, by using components/filemanager/controller.php as http://Ipaddr/components/filemanager/controller.php?action=upload&path=/var/www/html/data/projectname
- Vendor Homepage: http://codiad.com/
- Software Link: https://github.com/Codiad/Codiad/releases/tag/v.2.8.4
- Version: 2.8.4
- Tested on: Xubuntu 20.04
python3 exploit.py [target_IP] [target_port] [username] [password]

