Title | Raisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injection |
---|
Description | A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown code of the file list_vpn_web_custom.php of the component Web Interface. |
---|
Source | ⚠️ https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/sQrromK7x42JbLgY/Command%20Injection%20Vulnerability%20in%20RAISECOM%20Gateway%20Devices-list_vpn_web_custom.php.pdf |
---|
User | H0e4a0r1t (UID 65358) |
---|
Submission | 08/03/2024 10:47 AM (4 months ago) |
---|
Moderation | 08/04/2024 10:30 AM (24 hours later) |
---|
Status | Accepted |
---|
VulDB Entry | 273562 [Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 3.90 Web Interface list_vpn_web_custom.php sslvpn_config_mod template/stylenum os command injection] |
---|
Points | 17 |
---|