A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been classified as critical. This affects the function sslvpn_config_mod of the file /vpn/list_service_manage.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273561 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
History

Tue, 06 Aug 2024 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Raisecom msg1200
Raisecom msg2100e
Raisecom msg2100e Firmware
Raisecom msg2200
Raisecom msg2200 Firmware
Raisecom msg2300
Raisecom msg2300 Firmware
CPEs cpe:2.3:h:raisecom:msg1200:-:*:*:*:*:*:*:*
cpe:2.3:h:raisecom:msg2100e:-:*:*:*:*:*:*:*
cpe:2.3:h:raisecom:msg2200:-:*:*:*:*:*:*:*
cpe:2.3:h:raisecom:msg2300:-:*:*:*:*:*:*:*
cpe:2.3:o:raisecom:msg1200_firmware:3.90:*:*:*:*:*:*:*
cpe:2.3:o:raisecom:msg2100e_firmware:3.90:*:*:*:*:*:*:*
cpe:2.3:o:raisecom:msg2200_firmware:3.90:*:*:*:*:*:*:*
cpe:2.3:o:raisecom:msg2300_firmware:3.90:*:*:*:*:*:*:*
Vendors & Products Raisecom msg1200
Raisecom msg2100e
Raisecom msg2100e Firmware
Raisecom msg2200
Raisecom msg2200 Firmware
Raisecom msg2300
Raisecom msg2300 Firmware

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-08-05T03:00:09.370Z

Updated: 2024-08-05T15:30:35.443Z

Reserved: 2024-08-04T08:30:35.615Z

Link: CVE-2024-7468

cve-icon Vulnrichment

Updated: 2024-08-05T15:29:57.884Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-05T03:16:08.363

Modified: 2024-08-06T17:35:40.080

Link: CVE-2024-7468

cve-icon Redhat

No data.