diff --git a/Seeyon/htmlofficeservlet_uploadfile_getshell/README.md b/Seeyon/htmlofficeservlet_uploadfile_getshell/README.md
index 34e5491..71b4115 100644
--- a/Seeyon/htmlofficeservlet_uploadfile_getshell/README.md
+++ b/Seeyon/htmlofficeservlet_uploadfile_getshell/README.md
@@ -1,11 +1,11 @@
-# CVE-2020-24571 NexusDB path traversal
+# Seeyon OA htmlofficeservlet upload file getshell
-NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal.
+致远是从事OA办公自动化软件的开发销售与服务工作,致远OA在国内使用广泛。该漏洞可造成任意文件上传,恶意攻击者通过精心构造POST数据来上传JSP Webshell,提升服务器权限,从而控制服务器或对系统造成破坏。
-**Affected version**: nexusdb < 4.50.23
+**Affected version**: 致远A8-V5协同管理软件 V6.1sp1、致远A8+协同管理软件
-**[FOFA](https://fofa.so/result?q=header%3D%22Server%3A+NexusDB%22&qbase64=aGVhZGVyPSJTZXJ2ZXI6IE5leHVzREIi&file=&file=) query rule**: header="Server: NexusDB"
+**[FOFA](https://fofa.so/result?qbase64=YXBwPSJZb255b3UtU2VleW9uLU9BIiB8fCBhcHA9IlNlZXlvbi1TZXJ2ZXIi) query rule**: app="Yonyou-Seeyon-OA" || app="Seeyon-Server"
# Demo
-
\ No newline at end of file
+
\ No newline at end of file