| 标题 | Raisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injection |
|---|
| 描述 | A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown code of the file list_ip_network.php of the component Web Interface. |
|---|
| 来源 | ⚠️ https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/sQrromK7x42JbLgY/Command%20Injection%20Vulnerability%20in%20RAISECOM%20Gateway%20Devices-list_ip_network.php.pdf |
|---|
| 用户 | H0e4a0r1t (UID 65358) |
|---|
| 提交 | 2024-08-03 10時45分 (2 年前) |
|---|
| 管理 | 2024-08-04 10時30分 (24 hours later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 273560 [Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 3.90 Web Interface /vpn/list_ip_network.php sslvpn_config_mod template/stylenum 权限提升] |
|---|
| 积分 | 17 |
|---|