'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

vul_app:tencent_enterprise_wechat_infomation_leakage(Rule ID:1070210291)

Release Date2025/9/15

Rule NameTencent Enterprise WeChat Infomation Leakage Vulnerability

Severity:critical

CVE ID

 

Descripiton

The /cgi-bin/gateway/agentinfo interface of Tencent Enterprise Wechat can directly obtain sensitive information, such as the secret without authorization, which can lead to the acquisition of the entire data and files of the enterprise WeChat.
Other reference:None

 

Solution

Update vendor patches.