From 3ba94035085e06bdf2074c83eb93ab8642222d7a Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" Date: Thu, 23 Apr 2026 03:25:20 +0000 Subject: [PATCH] =?UTF-8?q?docs:=20=E6=9B=B4=E6=96=B0=201=20=E7=AF=87?= =?UTF-8?q?=E6=96=87=E7=AB=A0=20-=20=E5=A4=A9=E5=9C=B0=E4=BC=9F=E4=B8=9AEa?= =?UTF-8?q?sy7=20capture=20=E5=91=BD=E4=BB=A4=E6=89=A7=E8=A1=8C=E6=BC=8F?= =?UTF-8?q?=E6=B4=9E=20[skip=20ci]?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index b54dbaa..c609b67 100644 --- a/README.md +++ b/README.md @@ -826,6 +826,7 @@ - [V2Board 信息泄露漏洞至权限绕过接管账户(CVE-2026-39912)分析复现](https://mrxn.net/jswz/v2board-data-leak-authentication-bypass.html) - [天地伟业Easy7 isHashCameraAuth SQL注入漏洞](https://mrxn.net/jswz/easy7-rest-inquestRoom-isHashCameraAuth-sqli.html) - [天地伟业Easy7 getConfigInfoList SQL注入漏洞](https://mrxn.net/jswz/easy7-rest-inquestRoom-getConfigInfoList-sqli.html) +- [天地伟业Easy7 capture 命令执行漏洞](https://mrxn.net/jswz/easy7-rest-file-capture-rce.html) ## 提权辅助相关