CVE-2024-6184

A vulnerability classified as critical was found in Ruijie RG-UAC 1.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/reboot/reboot_commit.php. The manipulation of the argument servicename leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269155. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_a.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.269155 Permissions Required VDB Entry
https://vuldb.com/?id.269155 Third Party Advisory VDB Entry
https://vuldb.com/?submit.354119 Third Party Advisory VDB Entry
https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_a.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.269155 Permissions Required VDB Entry
https://vuldb.com/?id.269155 Third Party Advisory VDB Entry
https://vuldb.com/?submit.354119 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ruijie:rg-uac_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-uac:-:*:*:*:*:*:*:*

History

21 Aug 2025, 01:04

Type Values Removed Values Added
First Time Ruijie rg-uac Firmware
Ruijie rg-uac
Ruijie
CPE cpe:2.3:h:ruijie:rg-uac:-:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:rg-uac_firmware:1.0:*:*:*:*:*:*:*
References () https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_a.md - () https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_a.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.269155 - () https://vuldb.com/?ctiid.269155 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.269155 - () https://vuldb.com/?id.269155 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.354119 - () https://vuldb.com/?submit.354119 - Third Party Advisory, VDB Entry

21 Nov 2024, 09:49

Type Values Removed Values Added
References () https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_a.md - () https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_a.md -
References () https://vuldb.com/?ctiid.269155 - () https://vuldb.com/?ctiid.269155 -
References () https://vuldb.com/?id.269155 - () https://vuldb.com/?id.269155 -
References () https://vuldb.com/?submit.354119 - () https://vuldb.com/?submit.354119 -
Summary
  • (es) Una vulnerabilidad fue encontrada en Ruijie RG-UAC 1.0 y clasificada como crítica. Una función desconocida del archivo /view/systemConfig/reboot/reboot_commit.php es afectada por esta vulnerabilidad. La manipulación del argumento nombre de servicio conduce a la inyección de comando del sistema operativo. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-269155. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.

20 Jun 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 12:15

Updated : 2025-08-21 01:04


NVD link : CVE-2024-6184

Mitre link : CVE-2024-6184

CVE.ORG link : CVE-2024-6184


JSON object : View

Products Affected

ruijie

  • rg-uac
  • rg-uac_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')