CVE-2023-34644
https://notcve.org/view.php?id=CVE-2023-34644
Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth. • https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389 https://www.ruijienetworks.com/support/securityBulletins/cybersecurity_bulletins/10001 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2023-3306 – Ruijie RG-EW1200G Admin Password app.09df2a9e44ab48766f5f.js access control
https://notcve.org/view.php?id=CVE-2023-3306
A vulnerability was found in Ruijie RG-EW1200G EW_3.0(1)B11P204. It has been declared as critical. This vulnerability affects unknown code of the file app.09df2a9e44ab48766f5f.js of the component Admin Password Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. • https://github.com/RCEraser/cve/blob/main/RG-EW1200G.md https://vuldb.com/?ctiid.231802 https://vuldb.com/?id.231802 • CWE-284: Improper Access Control •