Submeter #516292: www.digiwin.com digiwin ERP system v5.1.3 Unauthenticated File Upload Leading to Remote Code Executioninformação

Títulowww.digiwin.com digiwin ERP system v5.1.3 Unauthenticated File Upload Leading to Remote Code Execution
DescriçãoA critical vulnerability has been identified in the Digiwin ERP system, specifically in the file upload functionality of the DoWebUpload method. This vulnerability allows unauthenticated users to upload arbitrary files, potentially leading to remote code execution and complete server compromise.
Fonte⚠️ https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_4.md
Utilizador
 XU NIE (UID 82414)
Submissão07/03/2025 16h33 (há 1 Ano)
Moderação24/03/2025 12h19 (17 days later)
EstadoDuplicado
Entrada VulDB300726 [Digiwin ERP 5.1 /Api/FileUploadApi.ashx DoUpload/DoWebUpload Ficheiro Elevação de Privilégios]
Pontos0

Might our Artificial Intelligence support you?

Check our Alexa App!