Command Injection Vulnerability in Ruijie RG-UAC Network Management System
CVE-2024-4510
Key Information:
- Vendor
- Ruijie
- Status
- Rg-uac
- Vendor
- CVE Published:
- 6 May 2024
Badges
Summary
A severe security vulnerability has been identified in the Ruijie RG-UAC device, affecting versions up to 20240428. This vulnerability arises from improper handling of input in the arp_add_commit.php file, leading to potential OS command injection. Attackers can remotely manipulate specific parameters, including text_ip_addr and text_mac_addr, to execute arbitrary commands on the vulnerable system. Given the nature of this vulnerability and its public disclosure, systems utilizing Ruijie RG-UAC devices must be promptly assessed and secured against potential exploitation.
Affected Version(s)
RG-UAC 20240428
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
Vulnerability published
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability Reserved