Логотип exploitDog
bind:CVE-2024-7470
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-7470

Количество 3

Количество 3

nvd логотип

CVE-2024-7470

больше 1 года назад

A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been rated as critical. This issue affects the function sslvpn_config_mod of the file /vpn/vpn_template_style.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273563. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-4wpj-j932-mmgx

больше 1 года назад

A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been rated as critical. This issue affects the function sslvpn_config_mod of the file /vpn/vpn_template_style.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273563. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2024-06041

больше 1 года назад

Уязвимость функцию sslvpn_config_mod файла /vpn/vpn_template_style.php веб-интерфейса встроенного программного обеспечения маршрутизаторов Raisecom MSG1200, MSG2100E, MSG2200 и MSG2300, позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-7470

A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been rated as critical. This issue affects the function sslvpn_config_mod of the file /vpn/vpn_template_style.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273563. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
2%
Низкий
больше 1 года назад
github логотип
GHSA-4wpj-j932-mmgx

A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been rated as critical. This issue affects the function sslvpn_config_mod of the file /vpn/vpn_template_style.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273563. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
2%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-06041

Уязвимость функцию sslvpn_config_mod файла /vpn/vpn_template_style.php веб-интерфейса встроенного программного обеспечения маршрутизаторов Raisecom MSG1200, MSG2100E, MSG2200 и MSG2300, позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.8
2%
Низкий
больше 1 года назад

Уязвимостей на страницу