Submit #516292: www.digiwin.com digiwin ERP system v5.1.3 Unauthenticated File Upload Leading to Remote Code Executioninfo

Titlewww.digiwin.com digiwin ERP system v5.1.3 Unauthenticated File Upload Leading to Remote Code Execution
DescriptionA critical vulnerability has been identified in the Digiwin ERP system, specifically in the file upload functionality of the DoWebUpload method. This vulnerability allows unauthenticated users to upload arbitrary files, potentially leading to remote code execution and complete server compromise.
Source⚠️ https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_4.md
User
 XU NIE (UID 82414)
Submission03/07/2025 16:33 (1 Year ago)
Moderation03/24/2025 12:19 (17 days later)
StatusDuplicate
VulDB entry300726 [Digiwin ERP 5.1 /Api/FileUploadApi.ashx DoUpload/DoWebUpload File unrestricted upload]
Points0

Do you know our Splunk app?

Download it now for free!