제출 #494788: Hangzhou Synway Digital Information Technology Co.,Ltd. SMG Gateway Management Software 9-12ping.php Command Injection정보

제목Hangzhou Synway Digital Information Technology Co.,Ltd. SMG Gateway Management Software 9-12ping.php Command Injection
설명The `9-12ping.php` file in Hangzhou Sanhui SMG Gateway Management Software is vulnerable to command execution. Attackers can exploit this vulnerability by crafting specific HTTP POST requests to execute arbitrary commands on the target system. This vulnerability can be exploited **without authentication** and affects multiple assets, as confirmed by FOFA search results (853 entries with the title "Gateway Management Software"). Arbitrary Command Execution: Attackers can execute system commands to gain full control over the target device. Sensitive Information Disclosure: Commands may be used to retrieve sensitive data (e.g., configurations, credentials). Service Disruption: Malicious commands could crash the device or disrupt critical operations.
원천⚠️ https://github.com/stevenchen0x01/CVE/issues/1
사용자
 Steven_Dra3w (UID 76559)
제출2025. 02. 04. PM 01:30 (1 년도 ago)
모더레이션2025. 02. 18. PM 04:58 (14 days later)
상태수락
VulDB 항목296135 [Synway SMG Gateway Management Software 까지 20250204 9-12ping.php retry 권한 상승]
포인트들20

Do you know our Splunk app?

Download it now for free!