제출 #616920: Vaelsys Vaelsys V4 v4.1.0 Remote Code Execution in Vaelsys V4 Platform정보

제목Vaelsys Vaelsys V4 v4.1.0 Remote Code Execution in Vaelsys V4 Platform
설명The vulnerability allows arbitrary command execution by injecting malicious payloads into unfiltered user input parameters that are processed in `execute_DataObjectProc` by `testConnectivity` function located in `grid/vgrid_server.php`. Prerequisites: Valid PHP session ID (PHPSESSID) required; No authentication required.
원천⚠️ https://github.com/waiwai24/0101/blob/main/CVEs/Vaelsys/Remote_Code_Execution_in_Vaelsys_V4_Platform.md
사용자
 waiwai24 (UID 81637)
제출2025. 07. 16. AM 11:03 (9 개월 ago)
모더레이션2025. 07. 26. PM 06:14 (10 days later)
상태수락
VulDB 항목317847 [Vaelsys VaelsysV4 까지 5.1.0/5.4.0 Web interface /grid/vgrid_server.php execute_DataObjectProc xajaxargs 권한 상승]
포인트들19

Interested in the pricing of exploits?

See the underground prices here!