mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-05 18:27:13 +00:00
13 lines
1.0 KiB
Markdown
13 lines
1.0 KiB
Markdown
![]() |
## seeyon M1 Server userTokenService Code Execution Vulnerability
|
||
|
|
||
|
| **Vulnerability** | **seeyon M1 Server userTokenService Code Execution Vulnerability** |
|
||
|
| :----: | :-----|
|
||
|
| **Chinese name** | 致远 M1 移动端 userTokenService 代码执行漏洞 |
|
||
|
| **CVSS core** | 10.0 |
|
||
|
| **FOFA Query** (click to view the results directly)| [title=="M1-Server 已启动"](https://en.fofa.info/result?qbase64=dGl0bGU9PSJNMS1TZXJ2ZXIg5bey5ZCv5YqoIg%3D%3D) |
|
||
|
| **Number of assets affected** | 7050 |
|
||
|
| **Description** | Seeyon M1 Server is a mobile device.Seeyon M1 Server userTokenService code execution vulnerability, attackers can arbitrarily execute code on the server side, write back door, obtain server permissions, and then control the entire web server. |
|
||
|
| **Impact** | Seeyon M1 Server userTokenService code execution vulnerability, attackers can arbitrarily execute code on the server side, write back door, obtain server permissions, and then control the entire web server. |
|
||
|
|
||
|

|