从这个网页截图中,可以获取到以下关于漏洞的关键信息: 1. 漏洞名称:RG-NBS2009G-P switch has any user login 2. 制造商地址:[https://www.ruijie.com.cn/] 3. 漏洞影响:RG-NBS2009G-P 4. 漏洞位置:login check state = 1 5. 漏洞详情: - Ruijie RG-NBS2009G-P switch has an arbitrary user login vulnerability, which allows attackers to gain server privileges and cause the server to crash. 6. 漏洞验证: - [http://61.141.114.15:10034/index.htm] Enter any account and password in the login package, grab and return the package, and set login check state = 1. After modification, you can directly log in to the backend by releasing the package. - [http://61.141.114.15:10034/EXECU_SHELL] Forward the request to http://61.141.114.15:10034/EXECU_SHELL, set login check state = 1, and release the package. The server will crash. 7. 剩余资产: - http://113.116.145.214:10034/switch.htm - http://180.107.158.225:88/switch.htm - http://119.123.77.93:1033/switch.htm - http://61.141.114.15:10034/switch.htm - http://112.242.125.67:2222/switch.htm - http://59.45.111.251:10000/switch.htm - http://61.181.77.26:8091/switch.htm - http://119.123.77.93:1033/switch.htm - http://218.8.101.251:8010/switch.htm - http://112.26.136.90:8890/switch.htm - http://60.165.53.178:8813/switch.htm - http://112.242.125.67:2222/switch.htm - http://60.165.53.178:8812/switch.htm - http://60.165.53.178:8814/switch.htm 这些信息详细描述了RG-NBS2009G-P switch的任意用户登录漏洞,包括漏洞的验证方法和受影响的资产。