Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-6269

Опубликовано: 23 июн. 2024
Источник: nvd
CVSS3: 4.7
CVSS3: 7.2
CVSS2: 5.8
EPSS Низкий

Описание

A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects the function get_ip.addr_details of the file /view/vpn/autovpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument indevice leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-269482 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:ruijie:rg-uac_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-uac:-:*:*:*:*:*:*:*

EPSS

Процентиль: 72%
0.00725
Низкий

4.7 Medium

CVSS3

7.2 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 4.7
github
больше 1 года назад

A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects the function get_ip.addr_details of the file /view/vpn/autovpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument indevice leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-269482 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 4.7
fstec
больше 1 года назад

Уязвимость функции get_ip.addr_details микропрограммного обеспечения маршрутизаторов Ruijie RG-UAC связана с позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 72%
0.00725
Низкий

4.7 Medium

CVSS3

7.2 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-77