漏洞描述 Zeroshell是一款面向服务器和嵌入式设备的小型Linux发行版,其目标是提供网络服务系统。它可以通过自启动运行光盘或紧凑式闪存镜像的形式获得,并且可以用网页浏览器来配置,Zeroshell3.9.0容易出现远程命令执行漏洞。具体来说,发生此问题是因为Web应用程序处理了一些HTTP参数。未经身份验证的攻击者可以通过在易受攻击的参数内注入OS命令来利用此问题
相关漏洞推荐 CVE-2019-12725: Zeroshell 3.9.0 Remote Command Execution POC 2025-09-01 | Zeroshell ZeroShell 3.9.0 存在命令执行漏洞,/cgi-bin/kerbynet 页面,x509type 参数过滤不严格,导致攻击者可执行任意命令 app="Zeroshell-防火墙&... CVE-2009-0545: ZeroShell <= 1.0beta11 Remote Code Execution POC 2025-08-01 | ZeroShell ZeroShell 1.0beta11 and earlier via cgi-bin/kerbynet allows remote attackers to execute arbitrary co... CVE-2019-12725: Zeroshell 3.9.0 - Remote Command Execution POC 2025-08-01 | Zeroshell 3.9.0 Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occur... CVE-2020-10199: Nexus Repository before 3.21.2 allows JavaEL Injection POC 2025-09-01 | Nexus Repository 漏洞触发需要任意账户权限 body="Nexus Repository Manager" app="Nexus-Repository-Manager" CVE-2020-11455: LimeSurvey 4.1.11 - Path Traversal POC 2025-09-01 | LimeSurvey LimeSurvey before 4.1.12+200324 contains a path traversal vulnerability in application/controllers/a...