Submit #385349: Raisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injectioninfo

TitleRaisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injection
DescriptionA vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown code of the file list_vpn_web_custom.php of the component Web Interface.
Source⚠️ https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/sQrromK7x42JbLgY/Command%20Injection%20Vulnerability%20in%20RAISECOM%20Gateway%20Devices-list_vpn_web_custom.php.pdf
User
 H0e4a0r1t (UID 65358)
Submission08/03/2024 10:47 AM (4 months ago)
Moderation08/04/2024 10:30 AM (24 hours later)
StatusAccepted
VulDB Entry273562 [Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 3.90 Web Interface list_vpn_web_custom.php sslvpn_config_mod template/stylenum os command injection]
Points17

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!