mkdir nmap
sudo rustscan -a 172.31.1.28 --ulimit 5000 -- -T4 -A -oA nmap/all-ports-service-scan
A web server on port 80 is open
And looks like it is running Fuel CMS on version 1.4
I found an RCE exploit on searchsploit
Exploitation
First, let's mirror the exploit to our machine
Edit the IP address portion in the script, as well as the proxy part but if you will going to use burp suite, it's fine to leave it like that. And also make sure you're running it with Python 2, and requests library is installed.
When you run the script it will look like this.
Now we got an initial shell, but let's stabilize this by uploading a PHP reverse shell