網瑞達webvpn遠程命令執行漏洞

From PwnWiki
Revision as of 12:41, 10 April 2021 by Pwnwiki (talk | contribs) (Created page with "==漏洞利用== 任意普通賬戶登陸系統訪問<code>[email protected]:8860</code>返回“pong"代表可以進行RCE 返回401代表不可以(用域名解析到127...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

漏洞利用

任意普通賬戶登陸系統訪問[email protected]:8860返回“pong"代表可以進行RCE

返回401代表不可以(用域名解析到127繞過)