Title | Pihome PiHomeHVAC 2.0 SQL Injection |
---|
Description | In the PiHomeHVAC v 2.0 - there is a SQLi in the ajax.php controller.
The web application is vulnerable to SQL Injection attacks within ajax modal functionality. Attackers can exploit this vulnerability by injecting malicious input into the "Ajax" parameter,
which is used to edit values in the `sensors` table. A prerequisite is that a record exists in this table
To exploit the SQL injection vulnerability, attackers craft a payload containing malicious input and inject it into the "Ajax" parameter. For example,
submitting the payload `(sleep(20))--` triggers 20 seconds delay in the request. This demonstrates the successful execution of the injection within the application. |
---|
Source | ⚠️ https://www.singto.io/pocsforexploits/pihomehva_sqli_ajax.md |
---|
User | Jelle Janssens (UID 81048) |
---|
Submission | 02/05/2025 07:30 PM (3 months ago) |
---|
Moderation | 02/10/2025 12:09 PM (5 days later) |
---|
Status | Accepted |
---|
VulDB Entry | 295089 [pihome-shc PiHome 2.0 ajax.php?Ajax=GetModal_Sensor_Graph sql injection] |
---|
Points | 20 |
---|