Vulnerability Description
Ruijie NBR series routers contain an unauthenticated arbitrary file upload vulnerability via /ddi/server/fileupload.php. The endpoint accepts attacker-supplied values in the name and uploadDir parameters and saves the provided multipart file content without adequate validation or sanitization of file type, path, or extension. A remote attacker can upload a crafted PHP file and then access it from the web root, resulting in arbitrary code execution in the context of the web service. Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-14 UTC.
Related Weaknesses (CWE)
References
- https://cn-sec.com/archives/1995366.html
- https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilit
- https://rfk0z.github.io/posts/Ruijie-NBR-router-fileupload-php-arbitrary-file-up
- https://www.cnblogs.com/Domren/articles/19093295
- https://www.vulncheck.com/advisories/ruijie-networks-nbr-routers-unauthenticated
FAQ
What is CVE-2023-7330?
CVE-2023-7330 is a documented vulnerability. Ruijie NBR series routers contain an unauthenticated arbitrary file upload vulnerability via /ddi/server/fileupload.php. The endpoint accepts attacker-supplied values in the name and uploadDir paramet...
How severe is CVE-2023-7330?
CVSS scoring is not yet available for CVE-2023-7330. Check NVD for updates.
Is there a patch for CVE-2023-7330?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.