Raisecom SSLVPN Configuration Modification Vulnerability
CVE-2024-7469
Key Information:
Badges
Summary
A vulnerability exists in the web interface of Raisecom’s MSG1200, MSG2100E, MSG2200, and MSG2300 devices, impacting the sslvpn_config_mod function located in the /vpn/list_vpn_web_custom.php file. This flaw arises from improper handling of the 'template/stylenum' argument, enabling an attacker to perform OS command injection remotely. The vulnerability has been publicly disclosed, potentially allowing malicious actors to exploit the affected products unless remediated.
Affected Version(s)
MSG1200 3.90
MSG2100E 3.90
MSG2200 3.90
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved