OS Command Injection in Ruijie RG-UAC Products
CVE-2024-5336
Key Information:
Badges
Summary
A significant security vulnerability has been identified in the Ruijie RG-UAC product, specifically in the function addVlan located in the file /view/networkConfig/vlan/vlan_add_commit.php. This flaw allows an attacker to manipulate the argument phyport, resulting in an OS command injection. The risk is heightened due to the remote nature of the exploit, making it accessible to malicious actors without physical access to the network. As of now, the vendor has not provided any response regarding this critical issue, which has been publicly disclosed. Organizations using the affected versions are urged to review their security posture and implement necessary mitigations to protect against potential exploits.
Affected Version(s)
RG-UAC 20240516
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved