| Название | Hangzhou Synway Digital Information Technology Co.,Ltd. SMG Gateway Management Software 9-12ping.php Command Injection |
|---|
| Описание | The `9-12ping.php` file in Hangzhou Sanhui SMG Gateway Management Software is vulnerable to command execution. Attackers can exploit this vulnerability by crafting specific HTTP POST requests to execute arbitrary commands on the target system. This vulnerability can be exploited **without authentication** and affects multiple assets, as confirmed by FOFA search results (853 entries with the title "Gateway Management Software").
Arbitrary Command Execution: Attackers can execute system commands to gain full control over the target device.
Sensitive Information Disclosure: Commands may be used to retrieve sensitive data (e.g., configurations, credentials).
Service Disruption: Malicious commands could crash the device or disrupt critical operations. |
|---|
| Источник | ⚠️ https://github.com/stevenchen0x01/CVE/issues/1 |
|---|
| Пользователь | Steven_Dra3w (UID 76559) |
|---|
| Представление | 04.02.2025 13:30 (1 Год назад) |
|---|
| Модерация | 18.02.2025 16:58 (14 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 296135 [Synway SMG Gateway Management Software до 20250204 9-12ping.php retry эскалация привилегий] |
|---|
| Баллы | 20 |
|---|