GobyVuls/seeyon_M1_Server_userTokenService_Code_Execution_Vulnerability.md

13 lines
1.0 KiB
Markdown
Raw Normal View History

## seeyon M1 Server userTokenService Code Execution Vulnerability
| **Vulnerability** | **seeyon M1 Server userTokenService Code Execution Vulnerability** |
| :----: | :-----|
| **Chinese name** | 致远 M1 移动端 userTokenService 代码执行漏洞 |
| **CVSS core** | 10.0 |
| **FOFA Query** (click to view the results directly)| [title=="M1-Server 已启动"](https://en.fofa.info/result?qbase64=dGl0bGU9PSJNMS1TZXJ2ZXIg5bey5ZCv5YqoIg%3D%3D) |
| **Number of assets affected** | 7050 |
| **Description** | Seeyon M1 Server is a mobile device.Seeyon M1 Server userTokenService code execution vulnerability, attackers can arbitrarily execute code on the server side, write back door, obtain server permissions, and then control the entire web server. |
| **Impact** | Seeyon M1 Server userTokenService code execution vulnerability, attackers can arbitrarily execute code on the server side, write back door, obtain server permissions, and then control the entire web server. |
![](https://s3.bmp.ovh/imgs/2023/07/14/d3a8bec6a5065f70.gif)