We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | VulDB |
Reserved | 2024-03-26 |
Published | 2024-03-26 |
Updated | 2024-08-01 |
A vulnerability classified as critical was found in Ruijie RG-EG350 up to 20240318. Affected by this vulnerability is the function setAction of the file /itbox_pi/networksafe.php?a=set of the component HTTP POST Request Handler. The manipulation of the argument bandwidth leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257977 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
In Ruijie RG-EG350 bis 20240318 wurde eine kritische Schwachstelle entdeckt. Betroffen ist die Funktion setAction der Datei /itbox_pi/networksafe.php?a=set der Komponente HTTP POST Request Handler. Mittels dem Manipulieren des Arguments bandwidth mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | |
CVSS:2.0/AV:N/AC:L/Au:S/C:C/I:C/A:C |
2024-03-26: | Advisory disclosed |
2024-03-26: | VulDB entry created |
2024-03-26: | VulDB entry last update |
H0e4a0r1t (VulDB User)
https://vuldb.com/?id.257977 (VDB-257977 | Ruijie RG-EG350 HTTP POST Request setAction os command injection)
https://vuldb.com/?ctiid.257977 (VDB-257977 | CTI Indicators (IOB, IOC, TTP, IOA))
https://vuldb.com/?submit.300368 (Submit #300368 | Ruijie Easy Gateway Management System EG350 Remote Code Execution)