漏洞描述 【漏洞对象】GoAhead Web Server 【漏洞描述】在受影响的设备中,只要url中含有loginuse和loginpas这两个值即无需验证。甚至当这两个值对应的账号密码为空或者为错误的zzzzzzzzzzzzzz时均可通过验证。
相关漏洞推荐 CVE-2017-17562: Embedthis GoAhead <3.6.5 - Remote Code Execution POC 2025-09-01 | Embedthis GoAhead description: Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI... goahead-detected: Goahead Detected POC 2025-09-01 | goahead GoAhead是一个开源(商业许可)、简单、轻巧、功能强大、可以在多个平台运行的Web Server,多用于嵌入式系统、智能设备。其支持运行ASP、Javascript和标准的CGI程序。 app=&... CVE-2017-17562: Embedthis GoAhead <3.6.5 - Remote Code Execution POC 2025-08-01 | Embedthis GoAhead description: Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI... CVE-2017-1000028: GlassFish LFI POC 2025-09-01 | GlassFish GlassFish是一款强健的商业兼容应用服务器,达到产品级质量,可免费用于开发、部署和重新分发。开发者可以免费获得源代码,还可以对代码进行更改。GlassFish漏洞成因:java语义中会把&quo... CVE-2017-1000486: Primetek Primefaces 5.x - Remote Code Execution POC 2025-09-01 | Primetek Primefaces Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution.