A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been declared as critical. This vulnerability affects the function sslvpn_config_mod of the file /vpn/list_vpn_web_custom.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273562 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
References
History
Tue, 06 Aug 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Raisecom
Raisecom msg1200 Raisecom msg1200 Firmware Raisecom msg2100e Raisecom msg2100e Firmware Raisecom msg2200 Raisecom msg2200 Firmware Raisecom msg2300 Raisecom msg2300 Firmware |
|
CPEs | cpe:2.3:h:raisecom:msg1200:-:*:*:*:*:*:*:* cpe:2.3:h:raisecom:msg2100e:-:*:*:*:*:*:*:* cpe:2.3:h:raisecom:msg2200:-:*:*:*:*:*:*:* cpe:2.3:h:raisecom:msg2300:-:*:*:*:*:*:*:* cpe:2.3:o:raisecom:msg1200_firmware:3.90:*:*:*:*:*:*:* cpe:2.3:o:raisecom:msg2100e_firmware:3.90:*:*:*:*:*:*:* cpe:2.3:o:raisecom:msg2200_firmware:3.90:*:*:*:*:*:*:* cpe:2.3:o:raisecom:msg2300_firmware:3.90:*:*:*:*:*:*:* |
|
Vendors & Products |
Raisecom
Raisecom msg1200 Raisecom msg1200 Firmware Raisecom msg2100e Raisecom msg2100e Firmware Raisecom msg2200 Raisecom msg2200 Firmware Raisecom msg2300 Raisecom msg2300 Firmware |
MITRE
Status: PUBLISHED
Assigner: VulDB
Published: 2024-08-05T03:31:04.492Z
Updated: 2024-08-05T10:15:23.547Z
Reserved: 2024-08-04T08:30:38.137Z
Link: CVE-2024-7469
Vulnrichment
Updated: 2024-08-05T10:15:00.628Z
NVD
Status : Analyzed
Published: 2024-08-05T04:15:59.370
Modified: 2024-08-06T17:36:19.150
Link: CVE-2024-7469
Redhat
No data.