Submit #385350: Raisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injectioninfo

TitelRaisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injection
BeschreibungA vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown code of the file vpn_template_style.php of the component Web Interface.
Quelle⚠️ https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/sQrromK7x42JbLgY/Command%20Injection%20Vulnerability%20in%20RAISECOM%20Gateway%20Devices-vpn_template_style.php.pdf
Benutzer
 H0e4a0r1t (UID 65358)
Einreichung03.08.2024 10:48 (vor 2 Jahren)
Moderieren04.08.2024 10:30 (24 hours later)
StatusAkzeptiert
VulDB Eintrag273563 [Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 3.90 Web Interface vpn_template_style.php sslvpn_config_mod template/stylenum erweiterte Rechte]
Punkte17

Want to know what is going to be exploited?

We predict KEV entries!