### [CVE-2017-11585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11585) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description dayrui FineCms 5.0.9 has remote PHP code execution via the param parameter in an action=cache request to libraries/Template.php, aka Eval Injection. ### POC #### Reference - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#remote-php-code-execution #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/LoRexxar/LoRexxar