The REBUILD system has an SQL injection vulnerability in the /admin/admin-cli/exec interface.
The REBUILD system has an SQL injection vulnerability in the /admin/admin-cli/exec interface.
POC:
syscfg "SN" "123123' and updatexml(1,concat(0x3a,(select user())),1) and '1'='1"
The interface can be accessed once the administrator has logged in.It is important to note that the Content-Type field in the request header of the packet should not be application/x-www-form-urlencoded. I used text/plain during testing.