PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.1 (Ubuntu Linux; protocol 2.0)
5000/tcp open http Werkzeug httpd 0.16.1 (Python 3.8.5)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Foothold
There is an option to generate an MSFVenom payload, using a template file.
Searchsploit for any relevant exploits:
POC code for APK template file command injection vulnerability:
This will split the string based on the 'space' delimiter, and keep everything from the 3rd field onwards. By adding two spaces to the front, we are splitting the string into: "" <space> "" <space> ";/bin/bash -c ..." so that the command is retained.