Web
Nmap scan revealed that HttpFileServer httpd 2.3
is running on the target port 80
Webroot
it is indeed httpfileserver
it’s also known as hfs as well
searchsploit
┌──(kali㉿kali)-[~/archive/htb/labs/optimum]
└─$ searchsploit httpfileserver 2.3
--------------------------------------------------------- ---------------------------------
Exploit Title | Path
--------------------------------------------------------- ---------------------------------
Rejetto HttpFileServer 2.3.x - Remote Command Execution | windows/webapps/49125.py
--------------------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results
Checking the application on the exploit database shows an RCE exploit