Remote Command Injection Vulnerability in Ruijie RG-UAC Devices
CVE-2024-5338
Key Information:
- Vendor
- Ruijie
- Status
- Rg-uac
- Vendor
- CVE Published:
- 25 May 2024
Badges
Summary
A serious vulnerability has been identified in the Ruijie RG-UAC product line, affecting devices up to the version 20240516. This flaw resides in the script located at /view/vpn/autovpn/online.php, where improper validation of the peernode argument can lead to remote operating system command injection. This vulnerability allows attackers to manipulate user inputs, potentially gaining unauthorized access and executing arbitrary commands on the affected system. The exploit has been made public, increasing the risk of compromise for deployed systems, and the vendor has been unresponsive to pre-disclosure communications, leaving many users vulnerable. It is crucial for organizations using Ruijie devices to assess their exposure and take immediate action.
Affected Version(s)
RG-UAC 20240516
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved