提交 #616920: Vaelsys Vaelsys V4 v4.1.0 Remote Code Execution in Vaelsys V4 Platform信息

标题Vaelsys Vaelsys V4 v4.1.0 Remote Code Execution in Vaelsys V4 Platform
描述The vulnerability allows arbitrary command execution by injecting malicious payloads into unfiltered user input parameters that are processed in `execute_DataObjectProc` by `testConnectivity` function located in `grid/vgrid_server.php`. Prerequisites: Valid PHP session ID (PHPSESSID) required; No authentication required.
来源⚠️ https://github.com/waiwai24/0101/blob/main/CVEs/Vaelsys/Remote_Code_Execution_in_Vaelsys_V4_Platform.md
用户
 waiwai24 (UID 81637)
提交2025-07-16 11時03分 (10 月前)
管理2025-07-26 18時14分 (10 days later)
状态已接受
VulDB条目317847 [Vaelsys VaelsysV4 直到 5.1.0/5.4.0 Web interface /grid/vgrid_server.php execute_DataObjectProc xajaxargs 权限提升]
积分19

Want to know what is going to be exploited?

We predict KEV entries!