The process of exploiting vulnerabilities is simple and clear, using weak passwords to execute commands in the background, which belongs to a sequence that can be done with hands-on.
Weak password for xxl-job: admin/123456
After logging in, the interface is as follows:

Find task management and select the external interface executor to bounce the shell.

Select the created task, choose operation-GLUE IDE.

Open the editor window, write the command, and save.

Go back to the task window, select execute once.

The server nc is listening and successfully obtains server permissions.
