GobyVuls/seeyon_M1_Server_userTokenService_Code_Execution_Vulnerability.md
Goby df5037fbc5
Create seeyon_M1_Server_userTokenService_Code_Execution_Vulnerability.md
add seeyon M1 Server userTokenService Code Execution Vulnerability
2023-07-14 11:32:22 +08:00

13 lines
1.0 KiB
Markdown

## seeyon M1 Server userTokenService Code Execution Vulnerability
| **Vulnerability** | **seeyon M1 Server userTokenService Code Execution Vulnerability** |
| :----: | :-----|
| **Chinese name** | 致远 M1 移动端 userTokenService 代码执行漏洞 |
| **CVSS core** | 10.0 |
| **FOFA Query** (click to view the results directly)| [title=="M1-Server 已启动"](https://en.fofa.info/result?qbase64=dGl0bGU9PSJNMS1TZXJ2ZXIg5bey5ZCv5YqoIg%3D%3D) |
| **Number of assets affected** | 7050 |
| **Description** | Seeyon M1 Server is a mobile device.Seeyon M1 Server userTokenService code execution vulnerability, attackers can arbitrarily execute code on the server side, write back door, obtain server permissions, and then control the entire web server. |
| **Impact** | Seeyon M1 Server userTokenService code execution vulnerability, attackers can arbitrarily execute code on the server side, write back door, obtain server permissions, and then control the entire web server. |
![](https://s3.bmp.ovh/imgs/2023/07/14/d3a8bec6a5065f70.gif)