漏洞描述 【漏洞对象】GoAhead Web Server 【漏洞描述】在受影响的设备中,只要url中含有loginuse和loginpas这两个值即无需验证。甚至当这两个值对应的账号密码为空或者为错误的zzzzzzzzzzzzzz时均可通过验证。
相关漏洞推荐 Fortinet FortiWeb /api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi 权限绕过漏洞(CVE-2025-64446/CVE-2025-58034) Fortinet FortiWeb /api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi 权限绕过漏洞(CVE-2025-64446) Optilink 管理系统 /cgi/fsystem/gene.php 命令执行漏洞 Omnissa Workspace ONE UEM /DevicesGateway/apps/system-app-metadata 目录遍历漏洞(CVE-2025-25231) POC CVE-2017-17562: Embedthis GoAhead <3.6.5 - Remote Code Execution POC CVE-2022-45699: APsystems ECU-R Firmware - Command Injection POC CVE-2017-17562: Embedthis GoAhead <3.6.5 - Remote Code Execution POC azure-apim-system-assigned-identity-unconfigured: Azure API Management Service System-Assigned Managed Identity Not Configured POC azure-functionapp-system-assigned-missing: System-Assigned Managed Identities for Azure Functions POC baiteng-customer-relationship-system-weak-password: 百腾客户关系系统弱口令 POC dlink-sharecenter-dns-320-rce: D-Link ShareCenter DNS-320 system_mgr.cgi 远程命令执行漏洞 POC e-learning-system-authentication-bypass-rce: E-Learning System 1.0 - Authentication Bypass POC k8s-readonly-fs: Enforce Read-Only Filesystem for Containers