Submit #495413: Pihome-SHC Pihome 1.77 SQL Injectioninfo

TitlePihome-SHC Pihome 1.77 SQL Injection
DescriptionIn the Pihome v 1.77 - there is a SQLi in the ajax.php controller. The web application is vulnerable to SQL Injection attacks within ajax modal functionality. Attackers can exploit this vulnerability by injecting malicious input into the "id" parameter, which is used to edit values in the `mqtt` table. To exploit the SQL injection vulnerability, attackers craft a payload containing malicious input and inject it into the "id" parameter. For example, submitting the payload `(sleep(20))--` triggers 20 seconds delay in the request. This demonstrates the successful execution of the injection within the application.
Source⚠️ https://www.singto.io/pocsforexploits/pihome_sqli_ajax.md
User Jelle Janssens (UID 81048)
Submission02/05/2025 03:25 PM (4 months ago)
Moderation02/10/2025 12:09 PM (5 days later)
StatusAccepted
VulDB Entry295088 [pihome-shc PiHome 1.77 ajax.php?Ajax=GetModal_MQTTEdit ID sql injection]
Points20

Interested in the pricing of exploits?

See the underground prices here!