Submit #495548: Pihome PiHomeHVAC 2.0 SQL Injectioninfo

TitlePihome PiHomeHVAC 2.0 SQL Injection
DescriptionIn the PiHomeHVAC v 2.0 - there is a SQLi in the ajax.php controller. The web application is vulnerable to SQL Injection attacks within ajax modal functionality. Attackers can exploit this vulnerability by injecting malicious input into the "Ajax" parameter, which is used to edit values in the `sensors` table. A prerequisite is that a record exists in this table To exploit the SQL injection vulnerability, attackers craft a payload containing malicious input and inject it into the "Ajax" parameter. For example, submitting the payload `(sleep(20))--` triggers 20 seconds delay in the request. This demonstrates the successful execution of the injection within the application.
Source⚠️ https://www.singto.io/pocsforexploits/pihomehva_sqli_ajax.md
User Jelle Janssens (UID 81048)
Submission02/05/2025 07:30 PM (3 months ago)
Moderation02/10/2025 12:09 PM (5 days later)
StatusAccepted
VulDB Entry295089 [pihome-shc PiHome 2.0 ajax.php?Ajax=GetModal_Sensor_Graph sql injection]
Points20

Do you need the next level of professionalism?

Upgrade your account now!