Логотип exploitDog
bind:CVE-2024-7468
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-7468

Количество 3

Количество 3

nvd логотип

CVE-2024-7468

больше 1 года назад

A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been classified as critical. This affects the function sslvpn_config_mod of the file /vpn/list_service_manage.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273561 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-gg5j-vfc6-wfm3

больше 1 года назад

A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been classified as critical. This affects the function sslvpn_config_mod of the file /vpn/list_service_manage.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273561 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2024-06038

больше 1 года назад

Уязвимость функции sslvpn_config_mod файла /vpn/list_service_manage.php веб-интерфейса встроенного программного обеспечения маршрутизаторов Raisecom MSG1200, MSG2100E, MSG2200 и MSG2300, позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-7468

A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been classified as critical. This affects the function sslvpn_config_mod of the file /vpn/list_service_manage.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273561 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
2%
Низкий
больше 1 года назад
github логотип
GHSA-gg5j-vfc6-wfm3

A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been classified as critical. This affects the function sslvpn_config_mod of the file /vpn/list_service_manage.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273561 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
2%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-06038

Уязвимость функции sslvpn_config_mod файла /vpn/list_service_manage.php веб-интерфейса встроенного программного обеспечения маршрутизаторов Raisecom MSG1200, MSG2100E, MSG2200 и MSG2300, позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.8
2%
Низкий
больше 1 года назад

Уязвимостей на страницу