A vulnerability, which was classified as critical, was found in Dinstar Monitoring Platform 甘肃省危险品库监控平台 1.0. Affected is an unknown function of the file /itc/$%7BappPath%7D/login_getPasswordErrorNum.action. The manipulation of the argument userBean.loginName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/qiantx/cve/blob/main/cve6.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.319296 | Permissions Required VDB Entry |
https://vuldb.com/?id.319296 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.625361 | Third Party Advisory VDB Entry |
https://github.com/qiantx/cve/blob/main/cve6.md | Exploit Third Party Advisory |
Configurations
History
16 Sep 2025, 15:17
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dahuatech
Dahuatech monitoring Platform |
|
References | () https://github.com/qiantx/cve/blob/main/cve6.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.319296 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.319296 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.625361 - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:dahuatech:monitoring_platform:1.0:*:*:*:*:*:*:* |
12 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/qiantx/cve/blob/main/cve6.md - |
11 Aug 2025, 18:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Aug 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-09 20:15
Updated : 2025-09-16 15:17
NVD link : CVE-2025-8773
Mitre link : CVE-2025-8773
CVE.ORG link : CVE-2025-8773
JSON object : View
Products Affected
dahuatech
- monitoring_platform