This set of system after login, the vulnerability of many shallow dug several no sign of vulnerability here to submit an getshell it.
Vulnerability file: base/sys/tcpdump.php
exec($_REQUEST['bpf']." -w /tmp/dumpfiles/".$ nowtime.". pcap");
echo $_REQUEST['bpf']." -w /tmp/dumpfiles/".$ nowtime.". pcap";
The vulnerability is simple, direct command execution getshell, exp not attached, write to test the code area.
Use google to search for a few cases:
https://angelic. com. cn
https://test. bescar. com
http://mail. hualiu. cc
Attached 2 example used as proof of, the specific use of the method, see test code area: