'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:339618)

Rule General Information
Release Date: 2025-11-12
Rule Name: CoreMail Authentication Bypass Vulnerability
Severity:
CVE ID:
Rule Protection Details
Description: CoreMail is a widely deployed enterprise email system in East-Asian markets. The identified flaw exists in the administrative interface exposed through the path /manager/html. Attackers who can reach this interface may inject a crafted directory traversal sequence that ultimately points to the built-in cache directory /lunkr/cache/. By abusing this entry point it is possible to bypass normal authentication checks and gain unauthorized access to the management console. Once inside, an intruder can create, delete or modify any mailbox, change global server settings, harvest the entire mail store, and implant backdoors that persist across software updates. Because email servers contain not only user correspondence but also address books, calendar data and password-reset channels, a successful compromise frequently becomes the pivot for deeper lateral movement inside the target organization and can lead to large-scale data leakage or business-email-compromise fraud.
Impact: An unauthorized remote attacker can bypass authentication and gain access to the application with specially crafted requests.
Affected OS: Windows, Linux, Others
Reference:
Solutions
Please contact the software vendor to update the software patch.