| Título | www.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to result |
|---|
| Descripción | A file upload vulnerability has been discovered in the Digiwin ERP system that does not require authentication. This flaw permits attackers to upload arbitrary files, including potentially harmful ASPX files, which can result in remote code execution and total server compromise. |
|---|
| Fuente | ⚠️ https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_5.md |
|---|
| Usuario | XU NIE (UID 82414) |
|---|
| Sumisión | 2025-03-07 16:35 (hace 1 Año) |
|---|
| Moderación | 2025-03-24 12:19 (17 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 300727 [Digiwin ERP 5.0.1 UploadAjaxAPI.ashx Archivo escalada de privilegios] |
|---|
| Puntos | 17 |
|---|