aEnrich a+HRD has improper validation for login function. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and access API function to perform arbitrary system command or disrupt service.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
A+hrd | Aenrich | 6.8 (including) | 6.8 (including) |
A+hrd | Aenrich | 7.0 (including) | 7.0 (including) |