Soumettre #616920: Vaelsys Vaelsys V4 v4.1.0 Remote Code Execution in Vaelsys V4 Platforminformation

TitreVaelsys Vaelsys V4 v4.1.0 Remote Code Execution in Vaelsys V4 Platform
DescriptionThe vulnerability allows arbitrary command execution by injecting malicious payloads into unfiltered user input parameters that are processed in `execute_DataObjectProc` by `testConnectivity` function located in `grid/vgrid_server.php`. Prerequisites: Valid PHP session ID (PHPSESSID) required; No authentication required.
La source⚠️ https://github.com/waiwai24/0101/blob/main/CVEs/Vaelsys/Remote_Code_Execution_in_Vaelsys_V4_Platform.md
Utilisateur
 waiwai24 (UID 81637)
Soumission16/07/2025 11:03 (il y a 9 mois)
Modérer26/07/2025 18:14 (10 days later)
StatutAccepté
Entrée VulDB317847 [Vaelsys VaelsysV4 jusqu’à 5.1.0/5.4.0 Web interface /grid/vgrid_server.php execute_DataObjectProc xajaxargs élévation de privilèges]
Points19

Want to stay up to date on a daily basis?

Enable the mail alert feature now!