Through this vulnerability, the attacker can obtain the complete authority of the host, write files arbitrarily and obtain a large amount of Intranet information.<br>
Attackers can obtain the full authority of the host, write files arbitrarily and obtain a large amount of intranet information through this vulnerability.