Submit #516293: www.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to resultinfo

Titelwww.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to result
BeschreibungA file upload vulnerability has been discovered in the Digiwin ERP system that does not require authentication. This flaw permits attackers to upload arbitrary files, including potentially harmful ASPX files, which can result in remote code execution and total server compromise.
Quelle⚠️ https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_5.md
Benutzer
 XU NIE (UID 82414)
Einreichung07.03.2025 16:35 (vor 1 Jahr)
Moderieren24.03.2025 12:19 (17 days later)
StatusAkzeptiert
VulDB Eintrag300727 [Digiwin ERP 5.0.1 UploadAjaxAPI.ashx Datei erweiterte Rechte]
Punkte17

Interested in the pricing of exploits?

See the underground prices here!