';
}
else{
echo ' ';
}
echo '
Hillstone Networks ';
} elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") {
echo ' ';
echo 'huaantech ';
} elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") {
echo ' ';
echo 'dcnetworks ';
} elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") {
if (false===strpos($_SERVER[REQUEST_URI],"/en/"))
echo ' ';
else
echo ' ';
echo 'w-ibeda ';
} elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") {
echo ' ';
echo 'hp-telecom ';
} elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") {
echo ' ';
echo 'Maipu ';
} elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") {
echo ' ';
echo 'Ncurity ';
} elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") {
echo ' ';
echo 'Socusnetwork ';
} else{
echo ' ';
echo 'Hillstone Networks ';
}
?>
vul_app:tencent_enterprise_wechat_infomation_leakage(Rule ID:1070210291)
Release Date :2025/9/15
Rule Name :Tencent Enterprise WeChat Infomation Leakage Vulnerability
Severity :critical
CVE ID :
The /cgi-bin/gateway/agentinfo interface of Tencent Enterprise Wechat can directly obtain sensitive information, such as the secret without authorization, which can lead to the acquisition of the entire data and files of the enterprise WeChat. Other reference:None
Update vendor patches.