提交 #385347: Raisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injection信息

标题Raisecom RAISECOM Gateway Devices Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 Command Injection
描述A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown code of the file list_ip_network.php of the component Web Interface.
来源⚠️ https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/sQrromK7x42JbLgY/Command%20Injection%20Vulnerability%20in%20RAISECOM%20Gateway%20Devices-list_ip_network.php.pdf
用户
 H0e4a0r1t (UID 65358)
提交2024-08-03 10時45分 (2 年前)
管理2024-08-04 10時30分 (24 hours later)
状态已接受
VulDB条目273560 [Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 3.90 Web Interface /vpn/list_ip_network.php sslvpn_config_mod template/stylenum 权限提升]
积分17

Might our Artificial Intelligence support you?

Check our Alexa App!