जमा करें #385350: Raisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injectionजानकारी

शीर्षकRaisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injection
विवरणA vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown code of the file vpn_template_style.php of the component Web Interface.
स्रोत⚠️ https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/sQrromK7x42JbLgY/Command%20Injection%20Vulnerability%20in%20RAISECOM%20Gateway%20Devices-vpn_template_style.php.pdf
उपयोगकर्ता
 H0e4a0r1t (UID 65358)
सबमिशन03/08/2024 10:48 AM (2 साल पहले)
संयम04/08/2024 10:30 AM (24 hours later)
स्थितिस्वीकृत
VulDB प्रविष्टि273563 [Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 3.90 Web Interface vpn_template_style.php sslvpn_config_mod template/stylenum अधिकार वृद्धि]
अंक17

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!