A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been classified as critical. This affects the function sslvpn_config_mod of the file /vpn/list_service_manage.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273561 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
References
History
Tue, 06 Aug 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Raisecom msg1200
Raisecom msg2100e Raisecom msg2100e Firmware Raisecom msg2200 Raisecom msg2200 Firmware Raisecom msg2300 Raisecom msg2300 Firmware |
|
CPEs | cpe:2.3:h:raisecom:msg1200:-:*:*:*:*:*:*:* cpe:2.3:h:raisecom:msg2100e:-:*:*:*:*:*:*:* cpe:2.3:h:raisecom:msg2200:-:*:*:*:*:*:*:* cpe:2.3:h:raisecom:msg2300:-:*:*:*:*:*:*:* cpe:2.3:o:raisecom:msg1200_firmware:3.90:*:*:*:*:*:*:* cpe:2.3:o:raisecom:msg2100e_firmware:3.90:*:*:*:*:*:*:* cpe:2.3:o:raisecom:msg2200_firmware:3.90:*:*:*:*:*:*:* cpe:2.3:o:raisecom:msg2300_firmware:3.90:*:*:*:*:*:*:* |
|
Vendors & Products |
Raisecom msg1200
Raisecom msg2100e Raisecom msg2100e Firmware Raisecom msg2200 Raisecom msg2200 Firmware Raisecom msg2300 Raisecom msg2300 Firmware |
MITRE
Status: PUBLISHED
Assigner: VulDB
Published: 2024-08-05T03:00:09.370Z
Updated: 2024-08-05T15:30:35.443Z
Reserved: 2024-08-04T08:30:35.615Z
Link: CVE-2024-7468
Vulnrichment
Updated: 2024-08-05T15:29:57.884Z
NVD
Status : Analyzed
Published: 2024-08-05T03:16:08.363
Modified: 2024-08-06T17:35:40.080
Link: CVE-2024-7468
Redhat
No data.