'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:339613)

Rule General Information
Release Date: 2025-11-12
Rule Name: ThinkAdmin Directory Traversal Vulnerability (CVE-2020-25540)
Severity:
CVE ID:
Rule Protection Details
Description: ThinkAdmin is a web-based administrative backend built on the ThinkPHP framework. A design flaw in the routing and parameter-filtering logic of certain releases allows unauthenticated attackers to submit a specially crafted request that traverses outside the intended directory scope. By supplying a URL-encoded array containing only the root path “/” to an internal update API, the application concatenates the value directly into file-operation routines without further validation. This behavior can be abused to enumerate or download arbitrary files from the server filesystem, including configuration files, source code, database credentials, TLS private keys, and user-uploaded content. Successful exploitation exposes the entire application surface and runtime environment, enabling follow-on activities such as source-code review, credential harvesting, lateral movement, and ultimately remote code execution. The resulting impact ranges from full data exfiltration and service disruption to complete compromise of the underlying host.
Impact: An attacker can abtain sensitive information of the target victim, and do malicious actions to gain profits using the information.
Affected OS: Windows, Linux, Others
Reference:
Solutions
Please contact the software vendor to update the software patch.