Vulnerability Description
A vulnerability classified as critical was found in Ruijie RG-EG350 up to 20240318. Affected by this vulnerability is the function setAction of the file /itbox_pi/networksafe.php?a=set of the component HTTP POST Request Handler. The manipulation of the argument bandwidth leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257977 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruijie | Rg-Eg350 Firmware | <= 2024-03-18 |
| Ruijie | Rg-Eg350 | - |
Related Weaknesses (CWE)
References
- https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20ManagemBroken Link
- https://vuldb.com/?ctiid.257977Permissions RequiredVDB Entry
- https://vuldb.com/?id.257977Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.300368Third Party AdvisoryVDB Entry
- https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20ManagemBroken Link
- https://vuldb.com/?ctiid.257977Permissions RequiredVDB Entry
- https://vuldb.com/?id.257977Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.300368Third Party AdvisoryVDB Entry
FAQ
What is CVE-2024-2909?
CVE-2024-2909 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability classified as critical was found in Ruijie RG-EG350 up to 20240318. Affected by this vulnerability is the function setAction of the file /itbox_pi/networksafe.php?a=set of the componen...
How severe is CVE-2024-2909?
CVE-2024-2909 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-2909?
Check the references section above for vendor advisories and patch information. Affected products include: Ruijie Rg-Eg350 Firmware, Ruijie Rg-Eg350.