diff --git a/seeyon_M1_Server_userTokenService_Code_Execution_Vulnerability.md b/seeyon_M1_Server_userTokenService_Code_Execution_Vulnerability.md new file mode 100644 index 0000000..e8dd3fc --- /dev/null +++ b/seeyon_M1_Server_userTokenService_Code_Execution_Vulnerability.md @@ -0,0 +1,12 @@ +## seeyon M1 Server userTokenService Code Execution Vulnerability + +| **Vulnerability** | **seeyon M1 Server userTokenService Code Execution Vulnerability** | +| :----: | :-----| +| **Chinese name** | 致远 M1 移动端 userTokenService 代码执行漏洞 | +| **CVSS core** | 10.0 | +| **FOFA Query** (click to view the results directly)| [title=="M1-Server 已启动"](https://en.fofa.info/result?qbase64=dGl0bGU9PSJNMS1TZXJ2ZXIg5bey5ZCv5YqoIg%3D%3D) | +| **Number of assets affected** | 7050 | +| **Description** | Seeyon M1 Server is a mobile device.Seeyon M1 Server userTokenService code execution vulnerability, attackers can arbitrarily execute code on the server side, write back door, obtain server permissions, and then control the entire web server. | +| **Impact** | Seeyon M1 Server userTokenService code execution vulnerability, attackers can arbitrarily execute code on the server side, write back door, obtain server permissions, and then control the entire web server. | + +![](https://s3.bmp.ovh/imgs/2023/07/14/d3a8bec6a5065f70.gif)