Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-6185

Опубликовано: 20 июн. 2024
Источник: nvd
CVSS3: 6.3
CVSS3: 8.8
CVSS2: 6.5
EPSS Низкий

Описание

A vulnerability, which was classified as critical, has been found in Ruijie RG-UAC 1.0. Affected by this issue is the function get_ip_addr_details of the file /view/dhcp/dhcpConfig/commit.php. The manipulation of the argument ethname leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269156. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:ruijie:rg-uac_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-uac:1.0:*:*:*:*:*:*:*

EPSS

Процентиль: 78%
0.01104
Низкий

6.3 Medium

CVSS3

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 6.3
github
больше 1 года назад

A vulnerability, which was classified as critical, has been found in Ruijie RG-UAC 1.0. Affected by this issue is the function get_ip_addr_details of the file /view/dhcp/dhcpConfig/commit.php. The manipulation of the argument ethname leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269156. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
fstec
больше 1 года назад

Уязвимость функции get_ip_addr_details (/view/dhcp/dhcpConfig/commit.php) микропрограммного обеспечения маршрутизаторов Ruijie RG-UAC, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 78%
0.01104
Низкий

6.3 Medium

CVSS3

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-78