Enviar #495548: Pihome PiHomeHVAC 2.0 SQL Injectioninformación

TitlePihome PiHomeHVAC 2.0 SQL Injection
DescriptionIn the PiHomeHVAC v 2.0 - there is a SQLi in the ajax.php controller. The web application is vulnerable to SQL Injection attacks within ajax modal functionality. Attackers can exploit this vulnerability by injecting malicious input into the "Ajax" parameter, which is used to edit values in the `sensors` table. A prerequisite is that a record exists in this table To exploit the SQL injection vulnerability, attackers craft a payload containing malicious input and inject it into the "Ajax" parameter. For example, submitting the payload `(sleep(20))--` triggers 20 seconds delay in the request. This demonstrates the successful execution of the injection within the application.
Source⚠️ https://www.singto.io/pocsforexploits/pihomehva_sqli_ajax.md
User Jelle Janssens (UID 81048)
Submission2025-02-05 19:30 (hace 5 meses)
Moderation2025-02-10 12:09 (5 days later)
StatusAceptado
VulDB Entry295089 [pihome-shc PiHome 2.0 ajax.php?Ajax=GetModal_Sensor_Graph sql injection]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!