BYD remote command execution can roam 44 hosts in the Intranet
High rank
219.134.188.42
A byd site
JAVA deserialization command execution vulnerability exists!
The host name can also be seen as byd.
Ipconfig
Intranet IP address, which can further threaten Intranet Security
Run
Net view
Server Name annotation connector \ AUTOFTP \ BID \ BYD-ASN \ BYD-BSP \ BYD-FC \ BYD-PO \ BYD-SCMASN \ BYD-SCMFC \ BYD-SCMPO \ BYDPOWER \ DLY-FUTIAN-001 \ DLY-FUTIAN-002 \ EDI1 EDI1 \ EDI5 \ LED-EIP \ NWCP \ PS-CC-SMS1 \ PS-CC4-ELECINTE \ PS-CC4-SFTP2 \ PS-DIV1-FORKLIF \ PS-DIV5-FTP02 \ PS-DLKX-BMAS01 \ PS-DMSCS-WEB1- WEB \ PS-DMSPRD-WEB01 \ PS-EDI-PROD2 \ PS-EDI-TEST02 \ PS-EDI-TEST03 \ PS-EDI-TEST04 \ PS-ERP-MDMFTP \ PS-ERP-MDMWEB2 \ PS-ERP-MDMWEB3 \ PS-IPRL-PATENT \ PS-MDM-APACHE \ PS-SALES-MAS \ PS-SAP-SAPROUTE \ PS-ZCB-YKTDB01 \ SFTP \ SPECIAL \ SVCTAG-DQ4KQ2X \ WIN-4APDCGTCQRC \ XUNIJIIIS command completed successfully.
44 hosts can be roaming the Intranet!