'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:339441)

Rule General Information
Release Date: 2025-09-03
Rule Name: Wadeinfo Intellectual Property Management System API WSDownloadPDF Arbitrary File Read Vulnerability
Severity:
CVE ID:
Rule Protection Details
Description: The Wadeinfo Intellectual Property Management System is meticulously crafted by Shenzhen Weide Kechuang Information Co., LTD., aiming to provide enterprises and agencies with comprehensive, efficient and secure intellectual property management solutions. There is a file reading vulnerability in the Wadeinfo Intellectual Property Management System WSDownloadPDF interface. Unauthenticated attackers can read important system files, database configuration files, etc. through this vulnerability.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, Others
Reference:
Solutions
Please contact the software vendor to update the software patch.