Home

Description

Ruijie RG-UAC Application Management Gateway contains a command injection vulnerability via the 'nmc_sync.php' interface. An unauthenticated attacker able to reach the affected endpoint can inject shell commands via crafted request data, causing the application to execute arbitrary commands on the host. Successful exploitation can yield full control of the application process and may lead to system-level access depending on the service privileges. VulnCheck has observed this vulnerability being targeted by the RondoDox botnet campaign.

PUBLISHED Reserved 2025-07-24 | Published 2025-10-15 | Updated 2025-10-15 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

*
affected

Credits

Anonymous User on CN-SEC finder

References

cn-sec.com/archives/2284248.html technical-description exploit

www.vulncheck.com/...e-rg-uac-nmc-sync-php-command-injection third-party-advisory

cve.org (CVE-2023-7304)

nvd.nist.gov (CVE-2023-7304)

Download JSON