| 제목 | Hangzhou Synway Digital Information Technology Co.,Ltd. SMG Gateway Management Software 9-12ping.php Command Injection |
|---|
| 설명 | The `9-12ping.php` file in Hangzhou Sanhui SMG Gateway Management Software is vulnerable to command execution. Attackers can exploit this vulnerability by crafting specific HTTP POST requests to execute arbitrary commands on the target system. This vulnerability can be exploited **without authentication** and affects multiple assets, as confirmed by FOFA search results (853 entries with the title "Gateway Management Software").
Arbitrary Command Execution: Attackers can execute system commands to gain full control over the target device.
Sensitive Information Disclosure: Commands may be used to retrieve sensitive data (e.g., configurations, credentials).
Service Disruption: Malicious commands could crash the device or disrupt critical operations. |
|---|
| 원천 | ⚠️ https://github.com/stevenchen0x01/CVE/issues/1 |
|---|
| 사용자 | Steven_Dra3w (UID 76559) |
|---|
| 제출 | 2025. 02. 04. PM 01:30 (1 년도 ago) |
|---|
| 모더레이션 | 2025. 02. 18. PM 04:58 (14 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 296135 [Synway SMG Gateway Management Software 까지 20250204 9-12ping.php retry 권한 상승] |
|---|
| 포인트들 | 20 |
|---|