OS Command Injection Vulnerability in Ruijie RG-UAC Products
CVE-2024-5340
Key Information:
- Vendor
- Ruijie
- Status
- Rg-uac
- Vendor
- CVE Published:
- 25 May 2024
Badges
Summary
A serious OS command injection vulnerability has been identified in Ruijie RG-UAC products, specifically affecting versions up to 20240516. This vulnerability arises from insufficient validation within the '/view/vpn/autovpn/sub_commit.php' file, allowing remote attackers to manipulate the 'key' argument and execute arbitrary commands on the host operating system. The exploitation of this vulnerability could lead to severe impacts on network security. Despite an early disclosure attempt to the vendor, there has been no response regarding necessary remediation measures. Organizations using affected versions are strongly advised to assess their exposure and implement appropriate security controls immediately.
Affected Version(s)
RG-UAC 20240516
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved