# 瑞斯康MSG1200/MSG2100E/MSG2200/MSG2300 Web界面list_base_config.php os命令注入漏洞
## 概述
在Raisecom(MSG1200, MSG2100E, MSG2200, MSG2300)的版本3.90中发现了一个严重的漏洞。该漏洞影响Web Interface组件中的未知部分文件`list_base_config.php`,通过操纵参数`template`可导致操作系统命令注入。
## 影响版本
- Raisecom MSG1200 3.90
- Raisecom MSG2100E 3.90
- Raisecom MSG2200 3.90
- Raisecom MSG2300 3.90
## 细节
攻击者可以通过远程方式触发此漏洞,修改参数`template`可能导致操作系统级别的命令注入。该漏洞已被公开披露,攻击方法已公开。
## 影响
攻击者可以远程利用此漏洞执行任意操作系统命令,可能造成系统控制权的丢失。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | ⚠️⚠️ CVE-2024-7120 Command Injection Vulnerability in RAISECOM Gateway Devices | https://github.com/fa-rrel/CVE-2024-7120 | POC详情 |
2 | ⚠️⚠️ CVE-2024-7120 Command Injection Vulnerability in RAISECOM Gateway Devices | https://github.com/gh-ost00/CVE-2024-7120 | POC详情 |
3 | A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown part of the file list_base_config.php of the component Web Interface. The manipulation of the argument template leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272451. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-7120.yaml | POC详情 |
4 | None | https://github.com/jokeir07x/CVE-2024-7120-Exploit-by-Dark-07x | POC详情 |
标题: Submit #380167: Raisecom MSG1200, MSG2100E, MSG2200, MSG2300 SoftwareVersion=3.90 Command Injection -- 🔗来源链接
标签: third-party-advisory