The process of exploiting vulnerabilities is simple and clear. Weak passwords can be used to execute commands in the background, which is a straightforward sequence of actions.
Weak password for xxl-job: admin/123456
After logging in, the interface is as follows:

Find task management and select the external interface executor to bounce the shell:

Select the created task, choose operation-GLUE IDE:

Open the editor window, write the command, and save:

Go back to the task window and select execute once:

The server nc is listening and successfully obtains server permissions:
