# Kyan 网络监控设备 run.php 远程命令执行漏洞 ## 漏洞描述 Kyan 网络监控设备 run.php可在身份验证的情况下执行任意命令, 配合账号密码泄露漏洞,可以获取服务器权限,存在远程命令执行漏洞 ## 漏洞影响 > [!NOTE] > > Kyan ## FOFA > [!NOTE] > > title="platform - Login" ## 漏洞复现 登录页面如下 ![](http://wikioss.peiqi.tech/vuln/ky-1.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10) 使用 Gobuster扫描文件 ![image-20210605093752342](http://wikioss.peiqi.tech/vuln/image-20210605093752342.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10) 其中 run.php 文件内容为 ```php

Shell Execute

``` ![image-20210605103631166](http://wikioss.peiqi.tech/vuln/image-20210605103631166.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)