';
}
else{
echo ' ';
}
echo '
Hillstone Networks ';
} elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") {
echo ' ';
echo 'huaantech ';
} elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") {
echo ' ';
echo 'dcnetworks ';
} elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") {
if (false===strpos($_SERVER[REQUEST_URI],"/en/"))
echo ' ';
else
echo ' ';
echo 'w-ibeda ';
} elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") {
echo ' ';
echo 'hp-telecom ';
} elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") {
echo ' ';
echo 'Maipu ';
} elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") {
echo ' ';
echo 'Ncurity ';
} elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") {
echo ' ';
echo 'Socusnetwork ';
} else{
echo ' ';
echo 'Hillstone Networks ';
}
?>
vul_frame:thinkphp_multi_lang_remote_code_exec_vul(Rule ID:1070110081)
Release Date :2025/9/15
Rule Name :ThinkPHP v5+ Framework Multi-Language Module Remote Code Execution Vulnerability
Severity :critical
CVE ID :
When the multi-language function of the Thinkphp program is enabled, parameters can be passed in through querystring, header, cookie, etc., and RCE can be realized through directory traversal and file inclusion. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021. Other reference:None
Update vendor patches.