Soumettre #385347: Raisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injectioninformation

TitreRaisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injection
DescriptionA vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown code of the file list_ip_network.php of the component Web Interface.
La source⚠️ https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/sQrromK7x42JbLgY/Command%20Injection%20Vulnerability%20in%20RAISECOM%20Gateway%20Devices-list_ip_network.php.pdf
Utilisateur
 H0e4a0r1t (UID 65358)
Soumission03/08/2024 10:45 (il y a 2 ans)
Modérer04/08/2024 10:30 (24 hours later)
StatutAccepté
Entrée VulDB273560 [Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 3.90 Web Interface /vpn/list_ip_network.php sslvpn_config_mod template/stylenum élévation de privilèges]
Points17

Do you want to use VulDB in your project?

Use the official API to access entries easily!