Soumettre #516292: www.digiwin.com digiwin ERP system v5.1.3 Unauthenticated File Upload Leading to Remote Code Executioninformation

Titrewww.digiwin.com digiwin ERP system v5.1.3 Unauthenticated File Upload Leading to Remote Code Execution
DescriptionA critical vulnerability has been identified in the Digiwin ERP system, specifically in the file upload functionality of the DoWebUpload method. This vulnerability allows unauthenticated users to upload arbitrary files, potentially leading to remote code execution and complete server compromise.
La source⚠️ https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_4.md
Utilisateur
 XU NIE (UID 82414)
Soumission07/03/2025 16:33 (il y a 1 Année)
Modérer24/03/2025 12:19 (17 days later)
StatutDupliqué
Entrée VulDB300726 [Digiwin ERP 5.1 /Api/FileUploadApi.ashx DoUpload/DoWebUpload Fichier élévation de privilèges]
Points0

Do you want to use VulDB in your project?

Use the official API to access entries easily!