7 results (0.002 seconds)

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects the function get_ip.addr_details of the file /view/vpn/autovpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument indevice leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/charliecatsec/cve1/issues/1 https://vuldb.com/?ctiid.269482 https://vuldb.com/?id.269482 https://vuldb.com/?submit.358202 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects unknown code of the file /view/vpn/autovpn/sub_commit.php. The manipulation of the argument key leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_d.md https://vuldb.com/?ctiid.269158 https://vuldb.com/?id.269158 https://vuldb.com/?submit.354125 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as critical, was found in Ruijie RG-UAC 1.0. This affects an unknown part of the file /view/userAuthentication/SSO/commit.php. The manipulation of the argument ad_log_name leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_c.md https://vuldb.com/?ctiid.269157 https://vuldb.com/?id.269157 https://vuldb.com/?submit.354122 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as critical, has been found in Ruijie RG-UAC 1.0. Affected by this issue is the function get_ip_addr_details of the file /view/dhcp/dhcpConfig/commit.php. The manipulation of the argument ethname leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_b.md https://vuldb.com/?ctiid.269156 https://vuldb.com/?id.269156 https://vuldb.com/?submit.354121 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as critical was found in Ruijie RG-UAC 1.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/reboot/reboot_commit.php. The manipulation of the argument servicename leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_a.md https://vuldb.com/?ctiid.269155 https://vuldb.com/?id.269155 https://vuldb.com/?submit.354119 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •