An attacker can execute arbitrary commands on the xunfeng server after login, the default account is admin:xunfeng321.
Use the following python function the generate the payload for bouncing a command shell, paste it to 配置 > 爬虫引擎 > 启用MASSCAN > 速率 and set scan mode to 1 (change 资产探测周期 may shorten the waiting time).
An attacker can execute arbitrary commands on the xunfeng server after login, the default account is
admin:xunfeng321.Use the following python function the generate the payload for bouncing a command shell, paste it to
配置>爬虫引擎>启用MASSCAN>速率and set scan mode to1(change资产探测周期may shorten the waiting time).The reason for the vulnerability is in
nascan/plugin/masscan.pyline 9 & 10, which miss to translate the backquote symbol`.Demo: https://asciinema.org/a/YMUpLsKMHHUSOG9hrTCrFNo9p
The text was updated successfully, but these errors were encountered: