Vulnerability CVE-2022-4136

Published: 2022-11-24

Attackers can call any existing functions at will, control the target server to access, download, create files, delete files, etc. Access may make the server a dos server. Download, so that an attacker can download the PHP Trojan to the server. Creating and deleting will destroy normal services. More than ten IPs are using this service.


Copyright 2022,


Back to Top