碧海威 L7多款產品 後台命令執行漏洞

From PwnWiki
Revision as of 09:01, 12 May 2021 by Pwnwiki (talk | contribs) (Created page with "==FOFA== <pre> "碧海威" </pre> ==漏洞利用== 默認密碼為 adimn/admin or admin123 漏洞存在於 命令控制台中,其中存在命令注入 系統中默認有...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

FOFA

"碧海威"

漏洞利用

默認密碼為 adimn/admin or admin123

漏洞存在於 命令控制台中,其中存在命令注入

系統中默認有 vi, 可以使用 !/bin/sh 得到交互式命令寫入惡意文件