CVE-2024-4510
Ruijie RG-UAC arp_add_commit.php os command injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability was found in Ruijie RG-UAC up to 20240428. It has been rated as critical. Affected by this issue is some unknown functionality of the file /view/networkConfig/ArpTable/arp_add_commit.php. The manipulation of the argument text_ip_addr/text_mac_addr leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-263114 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Se encontró una vulnerabilidad en Ruijie RG-UAC hasta 20240428. Se calificó como crítica. Una función desconocida del archivo /view/networkConfig/ArpTable/arp_add_commit.php es afectada por esta vulnerabilidad. La manipulación del argumento text_ip_addr/text_mac_addr conduce a la inyección de comandos del sistema operativo. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. VDB-263114 es el identificador asignado a esta vulnerabilidad. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.
Eine kritische Schwachstelle wurde in Ruijie RG-UAC bis 20240428 ausgemacht. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /view/networkConfig/ArpTable/arp_add_commit.php. Mittels dem Manipulieren des Arguments text_ip_addr/text_mac_addr mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-05-05 CVE Reserved
- 2024-05-06 CVE Published
- 2024-05-06 EPSS Updated
- 2024-08-01 CVE Updated
- 2024-08-01 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.263114 | Technical Description | |
https://vuldb.com/?submit.323820 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ruijie Search vendor "Ruijie" | Ru-uac Firmware Search vendor "Ruijie" for product "Ru-uac Firmware" | * | - |
Affected
|