chipik/SAP_GW_RCE_exploit

What is it? This PoC exploits an ACL misconfiguration in the SAP Gateway (port 33xx) that leads to a Remote Command Execution (RCE). SAPanonGWv1.py is the first version of the exploit based on raw packets sent. It does not require any additional modules (Run and Pwn!). SAPanonGWv2.

github.com/chipik/SAP_GW_RCE_exploit