Description
A vulnerability was identified in Shenzhen Sixun Software Sixun Shanghui Group Business Management System 4.10.24.3. Affected by this vulnerability is an unknown functionality of the file /api/GylOperator/UpdatePasswordBatch. The manipulation leads to weak password recovery. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
Timeline
| 2025-12-14: | Advisory disclosed |
| 2025-12-14: | VulDB entry created |
| 2025-12-14: | VulDB entry last update |
Credits
yaozhangYiqiyin (VulDB User)
References
vuldb.com/?id.336414 (VDB-336414 | Shenzhen Sixun Software Sixun Shanghui Group Business Management System UpdatePasswordBatch password recovery)
vuldb.com/?ctiid.336414 (VDB-336414 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.705601 (Submit #705601 | Shenzhen Sixun Software Co., Ltd. Sissyun Shanghui 7 Online Business System 4.10.24.3 Unauthorized)
github.com/...d-modificationfication-vulnerability./issues/1
github.com/...d-modificationfication-vulnerability./issues/1
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.