Congratulations for the creation of UPNP Exploiter! It is an incredible tool that takes advantage of the vulnerabilities of the UPNP protocol, this protocol is only made for device communication, they have not focused on its security and you can take advantage of certain vulnerabilities. I will check it out, I hope it works
