A vulnerability, which was classified as critical, has been found in Ruijie RG-UAC 1.0. Affected by this issue is the function get_ip_addr_details of the file /view/dhcp/dhcpConfig/commit.php. The manipulation of the argument ethname leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269156. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
References
History
Tue, 20 Aug 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ruijie
Ruijie rg-uac Ruijie rg-uac Firmware |
|
CPEs | cpe:2.3:h:ruijie:rg-uac:1.0:*:*:*:*:*:*:* cpe:2.3:o:ruijie:rg-uac_firmware:1.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Ruijie
Ruijie rg-uac Ruijie rg-uac Firmware |
MITRE
Status: PUBLISHED
Assigner: VulDB
Published: 2024-06-20T12:00:04.745Z
Updated: 2024-08-01T21:33:05.031Z
Reserved: 2024-06-20T05:28:05.454Z
Link: CVE-2024-6185
Vulnrichment
Updated: 2024-08-01T21:33:05.031Z
NVD
Status : Modified
Published: 2024-06-20T12:15:15.873
Modified: 2024-11-21T09:49:08.607
Link: CVE-2024-6185
Redhat
No data.