3 results (0.001 seconds)

CVSS: 9.8EPSS: 0%CPEs: 42EXPL: 1

Ruijie EG Series Routers version EG_3.0(1)B11P216 and before allows unauthenticated attackers to remotely execute arbitrary code due to incorrect filtering. Ruijie EG Series Routers versión EG_3.0(1)B11P216 y anteriores permiten a atacantes no autenticados ejecutar de forma remota código arbitrario debido a un filtrado incorrecto. • https://github.com/delsploit/CVE-2023-48849 •

CVSS: 8.8EPSS: 0%CPEs: 192EXPL: 1

A command injection vulnerability in RG-EW series home routers and repeaters v.EW_3.0(1)B11P219, RG-NBS and RG-S1930 series switches v.SWITCH_3.0(1)B11P219, RG-EG series business VPN routers v.EG_3.0(1)B11P219, EAP and RAP series wireless access points v.AP_3.0(1)B11P219, and NBC series wireless controllers v.AC_3.0(1)B11P219 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /cgi-bin/luci/api/cmd via the remoteIp field. • https://gist.github.com/ZIKH26/18693c67ee7d2f8d2c60231b19194c37 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.8EPSS: 0%CPEs: 130EXPL: 0

Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth. • https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389 https://www.ruijienetworks.com/support/securityBulletins/cybersecurity_bulletins/10001 • CWE-94: Improper Control of Generation of Code ('Code Injection') •