Отправить #616920: Vaelsys Vaelsys V4 v4.1.0 Remote Code Execution in Vaelsys V4 PlatformИнформация

НазваниеVaelsys Vaelsys V4 v4.1.0 Remote Code Execution in Vaelsys V4 Platform
ОписаниеThe vulnerability allows arbitrary command execution by injecting malicious payloads into unfiltered user input parameters that are processed in `execute_DataObjectProc` by `testConnectivity` function located in `grid/vgrid_server.php`. Prerequisites: Valid PHP session ID (PHPSESSID) required; No authentication required.
Источник⚠️ https://github.com/waiwai24/0101/blob/main/CVEs/Vaelsys/Remote_Code_Execution_in_Vaelsys_V4_Platform.md
Пользователь
 waiwai24 (UID 81637)
Представление16.07.2025 11:03 (9 месяцы назад)
Модерация26.07.2025 18:14 (10 days later)
Статуспринято
Запись VulDB317847 [Vaelsys VaelsysV4 до 5.1.0/5.4.0 Web interface /grid/vgrid_server.php execute_DataObjectProc xajaxargs эскалация привилегий]
Баллы19

Do you know our Splunk app?

Download it now for free!