An arbitrary file upload vulnerability has been identified in posts.php in Baby Care System 1.0. The vulnerability could be exploited by an remote attacker to upload content to the server, including PHP files, which could result in command execution and obtaining a shell.
References
| Link | Resource |
|---|---|
| https://github.com/TCSWT/Baby-Care-System/blob/main/README.md | Exploit Third Party Advisory |
| https://github.com/TCSWT/Baby-Care-System/blob/main/README.md | Exploit Third Party Advisory |
Configurations
History
18 Nov 2025, 20:01
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:janobe:baby_care_system:1.0:*:*:*:*:*:*:* | |
| First Time |
Janobe
Janobe baby Care System |
21 Nov 2024, 05:55
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/TCSWT/Baby-Care-System/blob/main/README.md - Exploit, Third Party Advisory |
Information
Published : 2021-02-17 15:15
Updated : 2025-11-18 20:01
NVD link : CVE-2021-25780
Mitre link : CVE-2021-25780
CVE.ORG link : CVE-2021-25780
JSON object : View
Products Affected
janobe
- baby_care_system
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
