A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. This affects an unknown part of the file /fladmin/user_recoverpwd.php. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality.
Link | Tags |
---|---|
https://vuldb.com/?id.291927 | third party advisory vdb entry |
https://vuldb.com/?ctiid.291927 | signature vdb entry permissions required |
https://vuldb.com/?submit.475237 | third party advisory vdb entry |
https://github.com/Fanli2012/native-php-cms/issues/4 | vendor advisory issue tracking exploit |
https://github.com/Fanli2012/native-php-cms/issues/4#issue-2769866348 | vendor advisory issue tracking exploit |