Whistle Blower RCE Exploit of inTouch-1.0

Un9nplayer
2 min readJun 3, 2024

--

RCE is considered part of a broader group of vulnerabilities known as arbitrary code execution (ACE) — RCE are possibly the most severe type of ACE, because they can be exploited even if an attacker has no prior access to the system or device. RCE is equivalent to a full compromise of the affected system or application, and can result in serious consequences such as data loss, service disruption, deployment of ransomware or other malware, and lateral movement of the attacker to other sensitive IT systems.

Let’s directly jump to exploit.

Few days before i hear someone talking about RCE of inTouch. And I’m very excited to test it.

Here is the full exploit POC check by yourself:

There nothing related to YouTube but I hope you subscribe it. Because you gonna find so much interesting thing related to Hacking, cve exploits, Malware related too, and also How to create/hack/do bla bla bla… 😁So, Subscribe if you want. I’m lazy to write full details on exploit and busy in bug bounty these days. So, it better you hit sub button for every interesting video instant checking my article on medium. I upload real POC not junk video.

Thanks for reading ; )

Follow me Instagram, Twitter, and Now on YouTube also 😁.

--

--