
CVE-2024-24116
https://notcve.org/view.php?id=CVE-2024-24116
02 Oct 2024 — An issue in Ruijie RG-NBS2009G-P RGOS v.10.4(1)P2 Release(9736) allows a remote attacker to gain privileges via the system/config_menu.htm. • https://gist.github.com/zty-1995/7a5e3ad0eb3b6c44db1a6eb4092893d3 • CWE-280: Improper Handling of Insufficient Permissions or Privileges •

CVE-2019-16639
https://notcve.org/view.php?id=CVE-2019-16639
16 Jul 2024 — An issue was found on the Ruijie EG-2000 series gateway. There is a newcli.php API interface without access control, which can allow an attacker (who only has web interface access) to use TELNET commands and/or show admin passwords via the mode_url=exec&command= substring. This affects EG-2000SE EG_RGOS 11.9 B11P1. • https://0x.mk/?p=239 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2019-16640
https://notcve.org/view.php?id=CVE-2019-16640
16 Jul 2024 — An issue was found in upload.php on the Ruijie EG-2000 series gateway. A parameter passed to the class UploadFile is mishandled (%00 and /var/./html are not checked), which can allow an attacker to upload any file to the gateway. This affects EG-2000SE EG_RGOS 11.9 B11P1. • https://0x.mk/?p=239 • CWE-284: Improper Access Control •

CVE-2019-16638
https://notcve.org/view.php?id=CVE-2019-16638
16 Jul 2024 — An issue was found on the Ruijie EG-2000 series gateway. An attacker can easily dump cleartext stored passwords in /data/config.text with simple XORs. This affects EG-2000SE EG_RGOS 11.1(1)B1. • https://0x.mk/?p=239 •

CVE-2024-6269 – Ruijie RG-UAC HTTP POST Request sxh_vpnlic.php get_ip.addr_details command injection
https://notcve.org/view.php?id=CVE-2024-6269
23 Jun 2024 — A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects the function get_ip.addr_details of the file /view/vpn/autovpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument indevice leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/charliecatsec/cve1/issues/1 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2024-6187 – Ruijie RG-UAC sub_commit.php os command injection
https://notcve.org/view.php?id=CVE-2024-6187
20 Jun 2024 — A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects unknown code of the file /view/vpn/autovpn/sub_commit.php. The manipulation of the argument key leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_d.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2024-6186 – Ruijie RG-UAC commit.php os command injection
https://notcve.org/view.php?id=CVE-2024-6186
20 Jun 2024 — A vulnerability, which was classified as critical, was found in Ruijie RG-UAC 1.0. This affects an unknown part of the file /view/userAuthentication/SSO/commit.php. The manipulation of the argument ad_log_name leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_c.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2024-6185 – Ruijie RG-UAC commit.php get_ip_addr_details os command injection
https://notcve.org/view.php?id=CVE-2024-6185
20 Jun 2024 — A vulnerability, which was classified as critical, has been found in Ruijie RG-UAC 1.0. Affected by this issue is the function get_ip_addr_details of the file /view/dhcp/dhcpConfig/commit.php. The manipulation of the argument ethname leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_b.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2024-6184 – Ruijie RG-UAC reboot_commit.php os command injection
https://notcve.org/view.php?id=CVE-2024-6184
20 Jun 2024 — A vulnerability classified as critical was found in Ruijie RG-UAC 1.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/reboot/reboot_commit.php. The manipulation of the argument servicename leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_a.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2024-5340 – Ruijie RG-UAC sub_commit.php os command injection
https://notcve.org/view.php?id=CVE-2024-5340
25 May 2024 — A vulnerability was found in Ruijie RG-UAC up to 20240516. It has been rated as critical. Affected by this issue is some unknown functionality of the file /view/vpn/autovpn/sub_commit.php. The manipulation of the argument key leads to os command injection. The attack may be launched remotely. • https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/z%7CYVDv%7CHKA)*%5CdK!/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-autovpn%3Asub_commit.php.pdf • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •