# zyx0814 Pichome index.php 路径遍历漏洞
## 漏洞概述
在 zyx0814 Pichome 2.1.0 中发现了一个被评为关键级别的漏洞。该漏洞影响未知部分的 `/index.php?mod=textviewer` 文件。通过操纵参数 `src` 可以导致路径遍历。
## 影响版本
- zyx0814 Pichome 2.1.0
## 漏洞细节
攻击者可以远程利用此漏洞。该漏洞的利用方法已公开。
## 漏洞影响
该漏洞可能导致路径遍历,攻击者可以远程利用此漏洞进行攻击。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | A vulnerability, which was classified as critical, was found in zyx0814 Pichome 2.1.0. This affects an unknown part of the file /index.php?mod=textviewer. The manipulation of the argument src leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-1743.yaml | POC详情 |
标题: zyx0814 Pichome 2.1.0 Arbitrary File Read Vulnerability · Issue #4 · sheratan4/cve -- 🔗来源链接
标签: exploit issue-tracking
标题: Login required -- 🔗来源链接
标签: signature permissions-required
标题: CVE-2025-1743 zyx0814 Pichome index.php path traversal -- 🔗来源链接
标签: vdb-entry technical-description
标题: Submit #502168: https://github.com/zyx0814/Pichome Pichome 2.1.0 Arbitrary file read -- 🔗来源链接
标签: third-party-advisory