Command Injection Vulnerability in Ruijie RG-UAC Application Management Gateway
CVE-2023-7304

9.3CRITICAL

Key Information:

Status
Vendor
CVE Published:
15 October 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2023-7304?

The Ruijie RG-UAC Application Management Gateway is susceptible to command injection through the 'nmc_sync.php' interface. An attacker with network access to this endpoint can manipulate request data to inject shell commands, leading to the execution of arbitrary commands on the affected system. Successful exploitation of this vulnerability could allow the attacker to gain full control over the application process and potentially escalate privileges based on the service's configurations. Observations indicate that this vulnerability has been exploited by the Rondo botnet, highlighting its significance in the cybersecurity landscape.

Affected Version(s)

RG-UAC *

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Anonymous User on CN-SEC
.
CVE-2023-7304 : Command Injection Vulnerability in Ruijie RG-UAC Application Management Gateway