CVE-2023-50993
https://notcve.org/view.php?id=CVE-2023-50993
Ruijie WS6008 v1.x v2.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 and WS6108 v1.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 was discovered to contain a command injection vulnerability via the function downFiles. Se descubrió que Ruijie WS6008 v1.x v2.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 y WS6108 v1.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 contenían una vulnerabilidad de inyección de comandos a través de la función downFiles. • https://github.com/ef4tless/vuln/blob/master/iot/WS6008-WS6108/1.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2023-48849
https://notcve.org/view.php?id=CVE-2023-48849
Ruijie EG Series Routers version EG_3.0(1)B11P216 and before allows unauthenticated attackers to remotely execute arbitrary code due to incorrect filtering. Ruijie EG Series Routers versión EG_3.0(1)B11P216 y anteriores permiten a atacantes no autenticados ejecutar de forma remota código arbitrario debido a un filtrado incorrecto. • https://github.com/delsploit/CVE-2023-48849 •
CVE-2023-38902
https://notcve.org/view.php?id=CVE-2023-38902
A command injection vulnerability in RG-EW series home routers and repeaters v.EW_3.0(1)B11P219, RG-NBS and RG-S1930 series switches v.SWITCH_3.0(1)B11P219, RG-EG series business VPN routers v.EG_3.0(1)B11P219, EAP and RAP series wireless access points v.AP_3.0(1)B11P219, and NBC series wireless controllers v.AC_3.0(1)B11P219 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /cgi-bin/luci/api/cmd via the remoteIp field. • https://gist.github.com/ZIKH26/18693c67ee7d2f8d2c60231b19194c37 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2023-4169 – Ruijie RG-EW1200G Administrator Password set_passwd access control
https://notcve.org/view.php?id=CVE-2023-4169
A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely. • https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G https://vuldb.com/?ctiid.236185 https://vuldb.com/?id.236185 • CWE-284: Improper Access Control •
CVE-2023-34644
https://notcve.org/view.php?id=CVE-2023-34644
Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth. • https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389 https://www.ruijienetworks.com/support/securityBulletins/cybersecurity_bulletins/10001 • CWE-94: Improper Control of Generation of Code ('Code Injection') •