Rapid7 Vulnerability & Exploit Database

ES File Explorer Open Port

Back to Search

ES File Explorer Open Port



This module connects to ES File Explorer's HTTP server to run certain commands. The HTTP server is started on app launch, and is available as long as the app is open. Version and below are reported vulnerable This module has been tested against


  • 小荷才露尖尖角
  • moonbocal
  • fs0c131y
  • h00die


Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/scanner/http/es_file_explorer_open_port
msf auxiliary(es_file_explorer_open_port) > show actions
msf auxiliary(es_file_explorer_open_port) > set ACTION < action-name >
msf auxiliary(es_file_explorer_open_port) > show options
    ...show and set options...
msf auxiliary(es_file_explorer_open_port) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security