'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

vul_srv:iis_httpsys_remote_code_exec(Rule ID:1070010005)

Release Date2025/9/15

Rule NameCVE-2015-1635: Microsoft IIS HTTP.sys Remote Code Execution

Severity:critical

CVE IDCVE-2015-1635

 

Descripiton

Internet Information Services (IIS) is an extensible Web server created by Microsoft. IIS is a Web service components, including Web server, FTP server, NNTP server and SMTP server, respectly used for Web browsing, file transfer, news services and email, etc.. IIS makes it convenient for users to publish information on network. HTTP.sys in Microsoft Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 and Windows Server 2012 R2 allows remote attackers to execute arbitrary code via crafted HTTP requests. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021.
Other reference:None

 

Solution

Update vendor patches.