In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through /Public/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive.
No PoCs from references.
- https://github.com/0xT11/CVE-POC
- https://github.com/snappyJack/CVE-2018-16370