A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown part of the file list_base_config.php of the component Web Interface. The manipulation of the argument template leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272451.
References
Link | Resource |
---|---|
https://netsecfish.notion.site/Command-Injection-Vulnerability-in-RAISECOM-Gateway-Devices-673bc7d2f8db499f9de7182d4706c707?pvs=4 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.272451 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.272451 | Third Party Advisory |
https://vuldb.com/?submit.380167 | Third Party Advisory |
https://netsecfish.notion.site/Command-Injection-Vulnerability-in-RAISECOM-Gateway-Devices-673bc7d2f8db499f9de7182d4706c707?pvs=4 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.272451 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.272451 | Third Party Advisory |
https://vuldb.com/?submit.380167 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 09:50
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 6.3 |
References | () https://netsecfish.notion.site/Command-Injection-Vulnerability-in-RAISECOM-Gateway-Devices-673bc7d2f8db499f9de7182d4706c707?pvs=4 - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.272451 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.272451 - Third Party Advisory | |
References | () https://vuldb.com/?submit.380167 - Third Party Advisory |
13 Aug 2024, 14:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:raisecom:msg1200_firmware:3.90:*:*:*:*:*:*:* cpe:2.3:o:raisecom:msg2200_firmware:3.90:*:*:*:*:*:*:* cpe:2.3:o:raisecom:msg2300_firmware:3.90:*:*:*:*:*:*:* cpe:2.3:h:raisecom:msg2200:-:*:*:*:*:*:*:* cpe:2.3:h:raisecom:msg2100e:-:*:*:*:*:*:*:* cpe:2.3:h:raisecom:msg2300:-:*:*:*:*:*:*:* cpe:2.3:o:raisecom:msg2100e_firmware:3.90:*:*:*:*:*:*:* cpe:2.3:h:raisecom:msg1200:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 9.8 |
First Time |
Raisecom msg2300
Raisecom msg2100e Raisecom msg2200 Firmware Raisecom Raisecom msg1200 Firmware Raisecom msg2100e Firmware Raisecom msg2200 Raisecom msg1200 Raisecom msg2300 Firmware |
|
References | () https://netsecfish.notion.site/Command-Injection-Vulnerability-in-RAISECOM-Gateway-Devices-673bc7d2f8db499f9de7182d4706c707?pvs=4 - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.272451 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.272451 - Third Party Advisory | |
References | () https://vuldb.com/?submit.380167 - Third Party Advisory |
26 Jul 2024, 12:38
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Jul 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-26 05:15
Updated : 2024-11-21 09:50
NVD link : CVE-2024-7120
Mitre link : CVE-2024-7120
CVE.ORG link : CVE-2024-7120
JSON object : View
Products Affected
raisecom
- msg2200
- msg2100e_firmware
- msg2300_firmware
- msg1200_firmware
- msg2100e
- msg2200_firmware
- msg2300
- msg1200
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')