| Vendor | Product | Version Range | Status |
|---|---|---|---|
| Seeyon (Beijing Zhiyuan Internet Software Co., Ltd.) | Zhiyuan OA Web Application System | 5.0 | affected |
5.1≤ 5.6sp1 | affected | ||
6.0≤ 6.1sp2 | affected | ||
7.0 | affected | ||
7.0sp1≤ 7.1 | affected | ||
7.1sp1 | affected | ||
8.0≤ 8.0sp2 | affected |
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Seeyon (Beijing Zhiyuan Internet Software Co., Ltd.) | Zhiyuan OA Web Application System | 5.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | An arbitrary file upload vulnerability exists in the Zhiyuan OA platform 5.0, 5.1 - 5.6sp1, 6.0 - 6.1sp2, 7.0, 7.0sp1 - 7.1, 7.1sp1, and 8.0 - 8.0sp2 via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-34040.yaml | POC Details |
| 2 | 致远OA存在文件上传导致RCE(CVE-2025-34040) | https://github.com/jisi-001/CVE-2025-34040Exp | POC Details |
No public POC found.
Login to generate AI POCNo comments yet