CVE-2025-6277

A vulnerability classified as critical has been found in Brilliance Golden Link Secondary System up to 20250609. This affects an unknown part of the file /storagework/custTakeInfoPage.htm. The manipulation of the argument custTradeName leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

cpe:2.3:a:brilliance:golden_link_secondary_system:*:*:*:*:*:*:*:*

History

30 Sep 2025, 18:42

Type Values Removed Values Added
CPE cpe:2.3:a:brilliance:golden_link_secondary_system:*:*:*:*:*:*:*:*
References () https://github.com/eeeeeekkkkkkkk/POC/blob/main/%E9%BB%84%E9%87%91%E9%80%9A%E4%BA%8C%E7%BA%A7%E7%B3%BB%E7%BB%9F%E4%B8%89%E4%BB%A3%E7%AE%A1%E7%90%86%E7%AB%AF%E7%B3%BB%E7%BB%9FcustTakeInfoPage%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md - () https://github.com/eeeeeekkkkkkkk/POC/blob/main/%E9%BB%84%E9%87%91%E9%80%9A%E4%BA%8C%E7%BA%A7%E7%B3%BB%E7%BB%9F%E4%B8%89%E4%BB%A3%E7%AE%A1%E7%90%86%E7%AB%AF%E7%B3%BB%E7%BB%9FcustTakeInfoPage%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md - Exploit
References () https://vuldb.com/?ctiid.313281 - () https://vuldb.com/?ctiid.313281 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.313281 - () https://vuldb.com/?id.313281 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.593074 - () https://vuldb.com/?submit.593074 - Third Party Advisory, VDB Entry
First Time Brilliance
Brilliance golden Link Secondary System

23 Jun 2025, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-19 21:15

Updated : 2025-09-30 18:42


NVD link : CVE-2025-6277

Mitre link : CVE-2025-6277

CVE.ORG link : CVE-2025-6277


JSON object : View

Products Affected

brilliance

  • golden_link_secondary_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')