Описание
OS Command Injection vulnerability in Ruijie RG-EW1200 EW_3.0(1)B11P227_EW1200_11130208RG-EW1200 V1.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.
Ссылки
- Broken LinkExploit
- Broken LinkExploit
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:ruijie:rg-ew1200_firmware:3.0\(1\)b11p227:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-ew1200:1.0:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
cpe:2.3:o:ruijie:rg-x60_firmware:3.0\(1\)b11p237:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-x60:-:*:*:*:*:*:*:*
EPSS
Процентиль: 52%
0.00287
Низкий
8.8 High
CVSS3
Дефекты
CWE-78
Связанные уязвимости
CVSS3: 8.8
github
около 2 месяцев назад
OS Command Injection vulnerability in Ruijie RG-EW1200 EW_3.0(1)B11P227_EW1200_11130208RG-EW1200 V1.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.
EPSS
Процентиль: 52%
0.00287
Низкий
8.8 High
CVSS3
Дефекты
CWE-78