Description
A vulnerability classified as critical was found in Ruijie RG-EG350 up to 20240318. Affected by this vulnerability is the function setAction of the file /itbox_pi/networksafe.php?a=set of the component HTTP POST Request Handler. The manipulation of the argument bandwidth leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257977 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
In Ruijie RG-EG350 bis 20240318 wurde eine kritische Schwachstelle entdeckt. Betroffen ist die Funktion setAction der Datei /itbox_pi/networksafe.php?a=set der Komponente HTTP POST Request Handler. Mittels dem Manipulieren des Arguments bandwidth mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
Problem types
Product status
Timeline
| 2024-03-26: | Advisory disclosed |
| 2024-03-26: | VulDB entry created |
| 2024-03-26: | VulDB entry last update |
Credits
H0e4a0r1t (VulDB User)
References
vuldb.com/?id.257977 (VDB-257977 | Ruijie RG-EG350 HTTP POST Request setAction os command injection)
vuldb.com/?ctiid.257977 (VDB-257977 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.300368 (Submit #300368 | Ruijie Easy Gateway Management System EG350 Remote Code Execution)
h0e4a0r1t.github.io/...ion Vulnerability networksafe.php.pdf
vuldb.com/?id.257977 (VDB-257977 | Ruijie RG-EG350 HTTP POST Request setAction os command injection)
vuldb.com/?ctiid.257977 (VDB-257977 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.300368 (Submit #300368 | Ruijie Easy Gateway Management System EG350 Remote Code Execution)
h0e4a0r1t.github.io/...ion Vulnerability networksafe.php.pdf