OS Command Injection Vulnerability in Ruijie RG-UAC Products
CVE-2024-4505
Key Information:
Badges
Summary
An OS command injection vulnerability has been identified in Ruijie RG-UAC systems up to version 20240428. This security flaw resides in the '/view/IPV6/ipv6Addr/ip_addr_add_commit.php' file, where improper handling of user-supplied input related to the 'prelen' and 'ethname' arguments allows attackers to execute arbitrary commands on the host system. The flaw can be exploited remotely, making it crucial for users to apply security protocols and updates to mitigate risks. Further information on this vulnerability has been disclosed publicly, highlighting the urgency for patch implementation to safeguard against potential exploitation.
Affected Version(s)
RG-UAC 20240428
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved