Added |
CVSS V2 |
|
VulDB (AV:N/AC:L/Au:S/C:P/I:P/A:P)
|
Added |
CVSS V3.1 |
|
VulDB AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
Added |
CVSS V4.0 |
|
VulDB CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
Added |
CWE |
|
VulDB CWE-78
|
Added |
Description |
|
A vulnerability, which was classified as critical, has been found in Ruijie RG-UAC 1.0. Affected by this issue is the function get_ip_addr_details of the file /view/dhcp/dhcpConfig/commit.php. The manipulation of the argument ethname leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269156. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
Added |
Reference |
|
VulDB https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_b.md [No types assigned]
|
Added |
Reference |
|
VulDB https://vuldb.com/?ctiid.269156 [No types assigned]
|
Added |
Reference |
|
VulDB https://vuldb.com/?id.269156 [No types assigned]
|
Added |
Reference |
|
VulDB https://vuldb.com/?submit.354121 [No types assigned]
|