OS Command Injection Vulnerability in Ruijie RG-UAC Products
CVE-2024-4501
Key Information:
Badges
Summary
A security vulnerability has been identified in Ruijie RG-UAC, specifically within the processing of the /view/bugSolve/captureData/commit.php file. The flaw arises from improper handling of user-supplied input, particularly the tcpDump parameter, leading to OS command injection. This vulnerability allows remote attackers to execute arbitrary commands on affected systems, potentially compromising confidentiality, integrity, and availability. The exploit for this vulnerability has been publicly disclosed, making it imperative for organizations utilizing Ruijie RG-UAC products to urgently assess their exposure and apply necessary security measures.
Affected Version(s)
RG-UAC 20240428
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved