'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:339251)

Rule General Information
Release Date: 2025-07-15
Rule Name: Baiyi Cloud Asset Management Operation System ticket.save.php SQL Injection Vulnerability
Severity:
CVE ID:
Rule Protection Details
Description: Baiyi Cloud Asset Management Operation System is a comprehensive asset management platform, designed to help enterprises efficiently manage and optimize the asset life cycle. The ticket.save.php interface of Baiyi Cloud Asset Management Operation System has an SQL injection vulnerability. Unauthenticated remote attackers can not only obtain information in the database by exploiting the SQL injection vulnerability, but even write Trojans into the server under high privileges to further gain system permissions of the server.
Impact: An attacker can inject arbitrary sql commands to view or change the database of the target by exploiting the vulnerability successfully.
Affected OS: Windows, Linux, Others
Reference:
Solutions
Please contact the software vendor to update the software patch.