Description
A vulnerability was identified in z-9527 admin 1.0/2.0. The affected element is the function checkName/register/login/getUser/getUsers of the file /server/controller/user.js. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
2.0
Timeline
| 2026-02-25: | Advisory disclosed |
| 2026-02-25: | VulDB entry created |
| 2026-02-25: | VulDB entry last update |
Credits
VulDB
References
vuldb.com/?id.347772 (VDB-347772 | z-9527 admin user.js getUsers sql injection)
vuldb.com/?ctiid.347772 (VDB-347772 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.758325 (Submit #758325 | z-9527 admin ≤ commit 72aaf2d SQL Injection)
vuldb.com/?submit.758326 (Submit #758326 | z-9527 admin ≤ commit 72aaf2d SQL Injection (Duplicate))
vuldb.com/?submit.758327 (Submit #758327 | z-9527 admin ≤ commit 72aaf2d SQL Injection (Duplicate))
vuldb.com/?submit.758328 (Submit #758328 | z-9527 admin ≤ commit 72aaf2d SQL Injection (Duplicate))
vuldb.com/?submit.758330 (Submit #758330 | z-9527 admin ≤ commit 72aaf2d SQL Injection (Duplicate))
github.com/...lities/tree/master/z9527-admin/vulnerability-1
github.com/...lities/tree/master/z9527-admin/vulnerability-2