'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:1505246)

Rule General Information
Release Date: 2025-11-12
Rule Name: Mysql UserDefineFunction Exploit Function SysExec Creation Detection
Severity:
CVE ID:
Rule Protection Details
Description: MySQL’s plugin interface permits privileged users to register external shared-library routines as User-Defined Functions (UDFs) callable from SQL. After obtaining a high-privileged database account, an attacker can upload a malicious shared object (commonly lib_mysqludf_sys) to a directory the server is allowed to load, then issue a CREATE FUNCTION statement that declares a routine named sys_exec. Once this function exists, any subsequent query can invoke it to execute arbitrary operating-system commands with the privileges of the mysqld process—typically the OS account that runs the database service. Because the function’s return value is limited to an integer exit code, attackers combine it with time-based delays, DNS exfiltration, or file writes to obtain command output. The technique provides a stealthy, OS-independent backdoor that can be used for lateral movement, persistence, data theft, cryptocurrency mining, ransomware deployment, or turning the database server into a springboard for deeper network compromise.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, Others
Reference:
Solutions
Please contact the software vendor to update the software patch.