Page 2 of 14 results (0.001 seconds)

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

Ruijie WS6008 v1.x v2.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 and WS6108 v1.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 was discovered to contain a command injection vulnerability via the function downFiles. Se descubrió que Ruijie WS6008 v1.x v2.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 y WS6108 v1.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 contenían una vulnerabilidad de inyección de comandos a través de la función downFiles. • https://github.com/ef4tless/vuln/blob/master/iot/WS6008-WS6108/1.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 0%CPEs: 42EXPL: 1

Ruijie EG Series Routers version EG_3.0(1)B11P216 and before allows unauthenticated attackers to remotely execute arbitrary code due to incorrect filtering. Ruijie EG Series Routers versión EG_3.0(1)B11P216 y anteriores permiten a atacantes no autenticados ejecutar de forma remota código arbitrario debido a un filtrado incorrecto. • https://github.com/delsploit/CVE-2023-48849 •

CVSS: 8.8EPSS: 0%CPEs: 192EXPL: 1

A command injection vulnerability in RG-EW series home routers and repeaters v.EW_3.0(1)B11P219, RG-NBS and RG-S1930 series switches v.SWITCH_3.0(1)B11P219, RG-EG series business VPN routers v.EG_3.0(1)B11P219, EAP and RAP series wireless access points v.AP_3.0(1)B11P219, and NBC series wireless controllers v.AC_3.0(1)B11P219 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /cgi-bin/luci/api/cmd via the remoteIp field. • https://gist.github.com/ZIKH26/18693c67ee7d2f8d2c60231b19194c37 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely. • https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G https://vuldb.com/?ctiid.236185 https://vuldb.com/?id.236185 • CWE-284: Improper Access Control •

CVSS: 9.8EPSS: 0%CPEs: 130EXPL: 0

Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth. • https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389 https://www.ruijienetworks.com/support/securityBulletins/cybersecurity_bulletins/10001 • CWE-94: Improper Control of Generation of Code ('Code Injection') •