Key Information Vulnerability Type SQL Injection Vulnerability Location method method method Vulnerability Code Snippet Exploitation Method Submit the parameter via GET request to construct malicious SQL statements. Example payload: Impact May lead to data leakage, data tampering, and other security issues. Verification Tested using Burp Suite; successfully retrieved user information from the database. Recommended Remediation Use prepared SQL statements or ORM frameworks to prevent SQL injection. Implement strict validation and filtering of input parameters.