Description
Ruijie NBR series routers contain an unauthenticated arbitrary file upload vulnerability via /ddi/server/fileupload.php. The endpoint accepts attacker-supplied values in the name and uploadDir parameters and saves the provided multipart file content without adequate validation or sanitization of file type, path, or extension. A remote attacker can upload a crafted PHP file and then access it from the web root, resulting in arbitrary code execution in the context of the web service. Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-14 UTC.
Problem types
CWE-434 Unrestricted Upload of File with Dangerous Type
Product status
Any version
Timeline
| 2023-01-01: | Vulnerability is publicly disclosed in 2023 |
References
github.com/...nerabilities/ruijie/ruijie-nbr-fileupload.yaml
cn-sec.com/archives/1995366.html
www.cnblogs.com/Domren/articles/19093295
rfk0z.github.io/...-php-arbitrary-file-upload-vulnerability/
www.vulncheck.com/...arbitrary-file-upload-via-fileuploadphp