A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘surname_filter’ parameter with the administrative account or through cross-site request forgery.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
advantech r-seenet 2.4.15 |