CVE-2024-6187

A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects unknown code of the file /view/vpn/autovpn/sub_commit.php. The manipulation of the argument key leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-269158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_d.md Exploit Third Party Advisory Issue Tracking
https://vuldb.com/?ctiid.269158 Permissions Required VDB Entry
https://vuldb.com/?id.269158 Third Party Advisory VDB Entry
https://vuldb.com/?submit.354125 Third Party Advisory VDB Entry
https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_d.md Exploit Third Party Advisory Issue Tracking
https://vuldb.com/?ctiid.269158 Permissions Required VDB Entry
https://vuldb.com/?id.269158 Third Party Advisory VDB Entry
https://vuldb.com/?submit.354125 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ruijie:rg-uac_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-uac:-:*:*:*:*:*:*:*

History

21 Aug 2025, 00:58

Type Values Removed Values Added
First Time Ruijie rg-uac Firmware
Ruijie rg-uac
Ruijie
References () https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_d.md - () https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_d.md - Exploit, Third Party Advisory, Issue Tracking
References () https://vuldb.com/?ctiid.269158 - () https://vuldb.com/?ctiid.269158 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.269158 - () https://vuldb.com/?id.269158 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.354125 - () https://vuldb.com/?submit.354125 - Third Party Advisory, VDB Entry
CPE cpe:2.3:h:ruijie:rg-uac:-:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:rg-uac_firmware:1.0:*:*:*:*:*:*:*

21 Nov 2024, 09:49

Type Values Removed Values Added
References () https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_d.md - () https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_d.md -
References () https://vuldb.com/?ctiid.269158 - () https://vuldb.com/?ctiid.269158 -
References () https://vuldb.com/?id.269158 - () https://vuldb.com/?id.269158 -
References () https://vuldb.com/?submit.354125 - () https://vuldb.com/?submit.354125 -
Summary
  • (es) Una vulnerabilidad ha sido encontrada en Ruijie RG-UAC 1.0 y clasificada como crítica. Esta vulnerabilidad afecta a código desconocido del archivo /view/vpn/autovpn/sub_commit.php. La manipulación de la clave del argumento conduce a la inyección de comandos del sistema operativo. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al público y puede utilizarse. VDB-269158 es el identificador asignado a esta vulnerabilidad. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.

20 Jun 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 13:15

Updated : 2025-08-21 00:58


NVD link : CVE-2024-6187

Mitre link : CVE-2024-6187

CVE.ORG link : CVE-2024-6187


JSON object : View

Products Affected

ruijie

  • rg-uac
  • rg-uac_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')