lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <899fdca72823cf33830c57896d86d089@posteo.de> Date: Mon, 02 May 2022 12:13:18 +0000 From: Minh-Khoa Tran <khoa@...teo.de> To: fulldisclosure@...lists.org Subject: [FD] Multiple Vulnerabilities in Ruijie RG-EW Series Routers Advisory: Multiple Vulnerabilities in Ruijie RG-EW Series Routers ======= Summary ======= Multiple vulnerabilities was found in Ruijie RG-EW Series Routers from Ruijie Networks, including 1 pre-authenticated and 5 post-authenticated Remote Code Execution (RCE). ============== CVE-2021-43159 ============== ## Description A Remote Code Execution (RCE) vulnerability exists in Ruijie Networks Ruijie RG-EW Series Routers up to ReyeeOS 1.55.1915 / EW_3.0(1)B11P55 via the setSessionTime function in /cgi-bin/luci/api/common. ## Details - Type: Post-authenticated RCE / Command Injection - Discoverer: Minh Khoa of VSEC - Affected Component: File: /usr/lib/lua/luci/modules/common.lua Function: setSessionTime - Tested on: Ruijie RG-EW1200, Ruijie RG-EW1200G PRO ============== CVE-2021-43160 ============== ## Description A Remote Code Execution (RCE) vulnerability exists in Ruijie Networks Ruijie RG-EW Series Routers up to ReyeeOS 1.55.1915 / EW_3.0(1)B11P55 via the switchFastDhcp function in /cgi-bin/luci/api/diagnose. ## Details - Type: Post-authenticated RCE / Command Injection - Discoverer: Minh Khoa of VSEC - Affected Component: File: /usr/lib/lua/luci/modules/diagnose.lua Function: switchFastDhcp - Tested on: Ruijie RG-EW1200, Ruijie RG-EW1200G PRO ============== CVE-2021-43161 ============== ## Description A Remote Code Execution (RCE) vulnerability exists in Ruijie Networks Ruijie RG-EW Series Routers up to ReyeeOS 1.55.1915 / EW_3.0(1)B11P55 via the doSwitchApi function in /cgi-bin/luci/api/switch. ## Details - Type: Post-authenticated RCE / Command Injection - Discoverer: Minh Khoa of VSEC - Affected Component: File: /usr/lib/lua/luci/modules/switch.lua Function: doSwitchApi - Tested on: Ruijie RG-EW1200, Ruijie RG-EW1200G PRO ============== CVE-2021-43162 ============== ## Description A Remote Code Execution (RCE) vulnerability exists in Ruijie Networks Ruijie RG-EW Series Routers up to ReyeeOS 1.55.1915 / EW_3.0(1)B11P55 via the runPackDiagnose function in /cgi-bin/luci/api/diagnose. ## Details - Type: Post-authenticated RCE / Command Injection - Discoverer: Minh Khoa of VSEC - Affected Component: File: /usr/lib/lua/luci/modules/diagnose.lua Function: runPackDiagnose - Tested on: Ruijie RG-EW1200, Ruijie RG-EW1200G PRO ============== CVE-2021-43163 ============== ## Description A Remote Code Execution (RCE) vulnerability exists in Ruijie Networks Ruijie RG-EW Series Routers up to ReyeeOS 1.55.1915 / EW_3.0(1)B11P55 via the checkNet function in /cgi-bin/luci/api/auth. ## Details - Type: Pre-authenticated RCE / Command Injection - Discoverer: Minh Khoa of VSEC - Affected Component: File: /usr/lib/lua/luci/modules/noauth.lua Function: checkNet - Tested on: Ruijie RG-EW1200, Ruijie RG-EW1200G PRO ============== CVE-2021-43164 ============== ## Description A Remote Code Execution (RCE) vulnerability exists in Ruijie Networks Ruijie RG-EW Series Routers up to ReyeeOS 1.55.1915 / EW_3.0(1)B11P55 via the updateVersion function in /cgi-bin/luci/api/wireless. ## Details - Type: Post-authenticated RCE / Command Injection - Discoverer: Minh Khoa of VSEC - Affected Component: File: /usr/lib/lua/luci/modules/wireless.lua Function: updateVersion - Tested on: Ruijie RG-EW1200, Ruijie RG-EW1200G PRO -- Khoa _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/
Powered by blists - more mailing lists