Submeter #769768: Topsec Technologies Inc. TopACM V3.0 OS Command Injectioninformação

TítuloTopsec Technologies Inc. TopACM V3.0 OS Command Injection
DescriçãoA critical security vulnerability exists in the nmc_sync.php endpoint due to improper validation of user-supplied input. Since this endpoint is accessible without authentication, a remote attacker can inject arbitrary shell commands by sending a specially crafted HTTP request. The vulnerability allows an attacker to redirect command execution results to a file within the web-accessible directory (view/systemConfig/management/), enabling a full "write-then-read" feedback loop. This bypasses typical blind injection limitations, allowing for persistent system compromise, sensitive data exfiltration, and complete control over the host server.
Fonte⚠️ https://my.feishu.cn/docx/EAFFdhzoeodDxfxeazNcxBzCnRf?from=from_copylink
Utilizador
 0menc (UID 75423)
Submissão02/03/2026 03h27 (há 2 meses)
Moderação14/03/2026 13h54 (12 days later)
EstadoAceite
Entrada VulDB351077 [Topsec TopACM 3.0 HTTP Request nmc_sync.php template_path Elevação de Privilégios]
Pontos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!