Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f7f9-7865-53wh

Опубликовано: 15 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3

Описание

Ruijie RG-UAC Application Management Gateway contains a command injection vulnerability via the 'nmc_sync.php' interface. An unauthenticated attacker able to reach the affected endpoint can inject shell commands via crafted request data, causing the application to execute arbitrary commands on the host. Successful exploitation can yield full control of the application process and may lead to system-level access depending on the service privileges. VulnCheck has observed this vulnerability being targeted by the Rondo botnet.

Ruijie RG-UAC Application Management Gateway contains a command injection vulnerability via the 'nmc_sync.php' interface. An unauthenticated attacker able to reach the affected endpoint can inject shell commands via crafted request data, causing the application to execute arbitrary commands on the host. Successful exploitation can yield full control of the application process and may lead to system-level access depending on the service privileges. VulnCheck has observed this vulnerability being targeted by the Rondo botnet.

EPSS

Процентиль: 85%
0.02549
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-78

Связанные уязвимости

nvd
19 дней назад

Ruijie RG-UAC Application Management Gateway contains a command injection vulnerability via the 'nmc_sync.php' interface. An unauthenticated attacker able to reach the affected endpoint can inject shell commands via crafted request data, causing the application to execute arbitrary commands on the host. Successful exploitation can yield full control of the application process and may lead to system-level access depending on the service privileges. VulnCheck has observed this vulnerability being targeted by the RondoDox botnet campaign.

EPSS

Процентиль: 85%
0.02549
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-78