CVE-2024-6269

A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects the function get_ip.addr_details of the file /view/vpn/autovpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument indevice leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-269482 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/charliecatsec/cve1/issues/1 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.269482 Permissions Required VDB Entry
https://vuldb.com/?id.269482 Third Party Advisory VDB Entry
https://vuldb.com/?submit.358202 Third Party Advisory VDB Entry
https://github.com/charliecatsec/cve1/issues/1 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.269482 Permissions Required VDB Entry
https://vuldb.com/?id.269482 Third Party Advisory VDB Entry
https://vuldb.com/?submit.358202 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ruijie:rg-uac_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-uac:-:*:*:*:*:*:*:*

History

21 Aug 2025, 00:57

Type Values Removed Values Added
CPE cpe:2.3:h:ruijie:rg-uac:-:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:rg-uac_firmware:1.0:*:*:*:*:*:*:*
First Time Ruijie rg-uac Firmware
Ruijie rg-uac
Ruijie
References () https://github.com/charliecatsec/cve1/issues/1 - () https://github.com/charliecatsec/cve1/issues/1 - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?ctiid.269482 - () https://vuldb.com/?ctiid.269482 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.269482 - () https://vuldb.com/?id.269482 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.358202 - () https://vuldb.com/?submit.358202 - Third Party Advisory, VDB Entry

21 Nov 2024, 09:49

Type Values Removed Values Added
References () https://github.com/charliecatsec/cve1/issues/1 - () https://github.com/charliecatsec/cve1/issues/1 -
References () https://vuldb.com/?ctiid.269482 - () https://vuldb.com/?ctiid.269482 -
References () https://vuldb.com/?id.269482 - () https://vuldb.com/?id.269482 -
References () https://vuldb.com/?submit.358202 - () https://vuldb.com/?submit.358202 -

24 Jun 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad ha sido encontrada en Ruijie RG-UAC 1.0 y clasificada como crítica. Esta vulnerabilidad afecta a la función get_ip.addr_details del archivo /view/vpn/autovpn/sxh_vpnlic.php del componente HTTP POST Request Handler. La manipulación del argumento en dispositivo conduce a la inyección de comando. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al público y puede utilizarse. VDB-269482 es el identificador asignado a esta vulnerabilidad. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.

23 Jun 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-23 12:15

Updated : 2025-08-21 00:57


NVD link : CVE-2024-6269

Mitre link : CVE-2024-6269

CVE.ORG link : CVE-2024-6269


JSON object : View

Products Affected

ruijie

  • rg-uac
  • rg-uac_firmware
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')