We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability classified as critical has been found in Digiwin ERP 5.1. Affected is the function DoUpload/DoWebUpload of the file /Api/FileUploadApi.ashx. The manipulation of the argument File leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine kritische Schwachstelle in Digiwin ERP 5.1 entdeckt. Hiervon betroffen ist die Funktion DoUpload/DoWebUpload der Datei /Api/FileUploadApi.ashx. Durch Manipulieren des Arguments File mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
2025-03-24: | Advisory disclosed |
2025-03-24: | VulDB entry created |
2025-03-24: | VulDB entry last update |
XU NIE (VulDB User)
vuldb.com/?id.300726 (VDB-300726 | Digiwin ERP FileUploadApi.ashx DoWebUpload unrestricted upload)
vuldb.com/?ctiid.300726 (VDB-300726 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.516291 (Submit #516291 | www.digiwin.com digiwin ERP system v5.1 Unrigorous file uploading results in RCE)
github.com/Rain1er/report/blob/main/THNlcnBf/RCE_3.md
github.com/Rain1er/report/blob/main/THNlcnBf/RCE_4.md
Support options