Soumettre #516293: www.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to resultinformation

Titrewww.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to result
DescriptionA file upload vulnerability has been discovered in the Digiwin ERP system that does not require authentication. This flaw permits attackers to upload arbitrary files, including potentially harmful ASPX files, which can result in remote code execution and total server compromise.
La source⚠️ https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_5.md
Utilisateur
 XU NIE (UID 82414)
Soumission07/03/2025 16:35 (il y a 1 Année)
Modérer24/03/2025 12:19 (17 days later)
StatutAccepté
Entrée VulDB300727 [Digiwin ERP 5.0.1 UploadAjaxAPI.ashx Fichier élévation de privilèges]
Points17

Want to know what is going to be exploited?

We predict KEV entries!