Python exploit for Conacwin v3.7.1.2.
Setelsa Conacwin v3.7.1.2 is vulnerable to a local file inclusion vulnerability. This vulnerability allows a remote unauthenticated attacker to read internal files on the server via an http:IP:PORT/../../path/file_to_disclose Directory Traversal URI
More references/info can be found at: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25068