POSCMS 3.2.18 allows remote attackers to execute arbitrary PHP code via the diy\dayrui\controllers\admin\Syscontroller.php 'add' function because an attacker can control the value of $data['name'] with no restrictions, and this value is written to the FCPATH.$file file.
- https://github.com/myndtt/vulnerability/blob/master/poscms/3-2-18.md
No PoCs found on GitHub currently.