Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Ruijie RG-EG350 HTTP POST Request vpnAction os command injection
Vulnerability Description
A vulnerability, which was classified as critical, has been found in Ruijie RG-EG350 up to 20240318. Affected by this issue is the function vpnAction of the file /itbox_pi/vpn_quickset_service.php?a=set_vpn of the component HTTP POST Request Handler. The manipulation of the argument ip/port/user/pass/dns/startIp leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257978 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
Ruijie Networks RG-EG350 操作系统命令注入漏洞
Vulnerability Description
Ruijie Networks RG-EG350是中国Ruijie Networks公司的一款解决当下中小规模网络出口难题的多业务综合网关产品。 Ruijie Networks RG-EG350 20240318及之前版本存在操作系统命令注入漏洞,该漏洞源于文件/itbox_pi/vpn_quickset_service.php的函数vpnAction存在操作系统命令注入漏洞。
CVSS Information
N/A
Vulnerability Type
N/A