Submit #385348: Raisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injectioninformação

TitleRaisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injection
DescriptionA vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown code of the file list_service_manage.php of the component Web Interface.
Source⚠️ https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/sQrromK7x42JbLgY/Command%20Injection%20Vulnerability%20in%20RAISECOM%20Gateway%20Devices-list_service_manage.php.pdf
User
 H0e4a0r1t (UID 65358)
Submission03/08/2024 10h46 (há 4 Meses)
Moderation04/08/2024 10h30 (24 hours later)
StatusAceite
VulDB Entry273561 [Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 3.90 Web Interface list_service_manage.php sslvpn_config_mod template/stylenum privilege escalation]
Points17

Want to stay up to date on a daily basis?

Enable the mail alert feature now!