Search criteria

9 vulnerabilities found for rg-ew1200g_firmware by ruijie

FKIE_CVE-2023-4169

Vulnerability from fkie_nvd - Published: 2023-08-05 18:15 - Updated: 2024-11-21 08:34
Summary
A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-236185 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Impacted products
Vendor Product Version
ruijie rg-ew1200g_firmware 1.0\(1\)b1p5
ruijie rg-ew1200g -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-ew1200g_firmware:1.0\\(1\\)b1p5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B16D6E8-5A22-45DB-9DAE-AC8CBC2DC1E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-ew1200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D49D3A7-F8C9-4273-B947-21B516DB5877",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-236185 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
    }
  ],
  "id": "CVE-2023-4169",
  "lastModified": "2024-11-21T08:34:32.073",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "cna@vuldb.com",
        "type": "Secondary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.4,
        "source": "cna@vuldb.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-05T18:15:17.850",
  "references": [
    {
      "source": "cna@vuldb.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G"
    },
    {
      "source": "cna@vuldb.com",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "https://vuldb.com/?ctiid.236185"
    },
    {
      "source": "cna@vuldb.com",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "https://vuldb.com/?id.236185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "https://vuldb.com/?ctiid.236185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "https://vuldb.com/?id.236185"
    }
  ],
  "sourceIdentifier": "cna@vuldb.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "cna@vuldb.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-34644

Vulnerability from fkie_nvd - Published: 2023-07-31 14:15 - Updated: 2024-11-21 08:07
Severity ?
Summary
Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth.
Impacted products
Vendor Product Version
ruijie rg-ew1200r_firmware 3.0\(1\)b11p204
ruijie rg-ew1200r -
ruijie rg-ew300_firmware 3.0\(1\)b11p204
ruijie rg-ew300 -
ruijie rg-ew3200gx_firmware 3.0\(1\)b11p204
ruijie rg-ew3200gx -
ruijie rg-ew1200g_firmware 3.0\(1\)b11p204
ruijie rg-ew1200g -
ruijie rg-ew1800gx_firmware 3.0\(1\)b11p204
ruijie rg-ew1800gx -
ruijie rg-ew300r_firmware 3.0\(1\)b11p204
ruijie rg-ew300r -
ruijie rg-ew1200_firmware 3.0\(1\)b11p204
ruijie rg-ew1200 -
ruijie rg-eg3000xe_firmware 3.0\(1\)b11p216
ruijie rg-eg3000xe -
ruijie rg-eg105g_firmware 3.0\(1\)b11p216
ruijie rg-eg105g -
ruijie rg-eg305gh-p-e_firmware 3.0\(1\)b11p216
ruijie rg-eg305gh-p-e -
ruijie rg-eg105g-p_firmware 3.0\(1\)b11p216
ruijie rg-eg105g-p -
ruijie rg-eg3230_firmware 3.0\(1\)b11p216
ruijie rg-eg3230 -
ruijie rg-eg1000e_firmware 3.0\(1\)b11p216
ruijie rg-eg1000e -
ruijie rg-eg105g-e_firmware 3.0\(1\)b11p216
ruijie rg-eg105g-e -
ruijie rg-eg105gw\(t\)_firmware 3.0\(1\)b11p216
ruijie rg-eg105gw\(t\) -
ruijie rg-eg105gw-x_firmware 3.0\(1\)b11p216
ruijie rg-eg105gw-x -
ruijie rg-eg2000ce_firmware 3.0\(1\)b11p216
ruijie rg-eg2000ce -
ruijie rg-eg2100-p_firmware 3.0\(1\)b11p216
ruijie rg-eg2100-p -
ruijie rg-eg209gs_firmware 3.0\(1\)b11p216
ruijie rg-eg209gs -
ruijie rg-eg310gh-e_firmware 3.0\(1\)b11p216
ruijie rg-eg310gh-e -
ruijie rg-eg3000eu_firmware 3.0\(1\)b11p216
ruijie rg-eg3000eu -
ruijie rg-eg210g-p_firmware 3.0\(1\)b11p216
ruijie rg-eg210g-p -
ruijie rg-eg3250_firmware 3.0\(1\)b11p216
ruijie rg-eg3250 -
ruijie re-eg1000m_firmware 3.0\(1\)b11p216
ruijie re-eg1000m -
ruijie rg-eg1000c_firmware 3.0\(1\)b11p216
ruijie rg-eg1000c -
ruijie rg-nbs3100-48gt4sfp-p_firmware 3.0\(1\)b11p218
ruijie rg-nbs3100-48gt4sfp-p -
ruijie rg-nbs3200-24gt4xs_firmware 3.0\(1\)b11p218
ruijie rg-nbs3200-24gt4xs -
ruijie rg-nbs3200-24sfp_firmware 3.0\(1\)b11p218
ruijie rg-nbs3200-24sfp -
ruijie rg-nbs3200-8gt4xs_firmware 3.0\(1\)b11p218
ruijie rg-nbs3200-8gt4xs -
ruijie rg-nbs3200-24gt4xs-p_firmware 3.0\(1\)b11p218
ruijie rg-nbs3200-24gt4xs-p -
ruijie rg-nbs3200-48gt4xs_firmware 3.0\(1\)b11p218
ruijie rg-nbs3200-48gt4xs -
ruijie rg-nbs3200-48gt4xs-p_firmware 3.0\(1\)b11p218
ruijie rg-nbs3200-48gt4xs-p -
ruijie rg-nbs3100-24gt4sfp_firmware 3.0\(1\)b11p218
ruijie rg-nbs3100-24gt4sfp -
ruijie rg-nbs3100-24gt4sfp-p_firmware 3.0\(1\)b11p218
ruijie rg-nbs3100-24gt4sfp-p -
ruijie rg-nbs3100-8gt2sfp_firmware 3.0\(1\)b11p218
ruijie rg-nbs3100-8gt2sfp -
ruijie rg-nbs3100-8gt2sfp-p_firmware 3.0\(1\)b11p218
ruijie rg-nbs3100-8gt2sfp-p -
ruijie rg-rap1260_firmware ap_3.0\(1\)b11p218
ruijie rg-rap1260 -
ruijie rg-rap2266_firmware ap_3.0\(1\)b11p218
ruijie rg-rap2266 -
ruijie rg-rap1261_firmware ap_3.0\(1\)b11p218
ruijie rg-rap1261 -
ruijie rg-rap73hd_firmware ap_3.0\(1\)b11p218
ruijie rg-rap73hd -
ruijie rg-rap2200\(e\)_firmware ap_3.0\(1\)b11p218
ruijie rg-rap2200\(e\) -
ruijie rg-rap6260\(h\)_firmware ap_3.0\(1\)b11p218
ruijie rg-rap6260\(h\) -
ruijie rg-rap1200\(p\)_firmware ap_3.0\(1\)b11p218
ruijie rg-rap1200\(p\) -
ruijie rg-rap2260\(e\)_firmware ap_3.0\(1\)b11p218
ruijie rg-rap2260\(e\) -
ruijie rg-rap6262\(g\)_firmware ap_3.0\(1\)b11p218
ruijie rg-rap6262\(g\) -
ruijie rg-rap6262_firmware ap_3.0\(1\)b11p218
ruijie rg-rap6262 -
ruijie rg-rap2260_firmware ap_3.0\(1\)b11p218
ruijie rg-rap2260 -
ruijie rg-rap6202\(g\)_firmware ap_3.0\(1\)b11p218
ruijie rg-rap6202\(g\) -
ruijie rg-rap1201_firmware ap_3.0\(1\)b11p218
ruijie rg-rap1201 -
ruijie rg-rap1200\(f\)_firmware ap_3.0\(1\)b11p218
ruijie rg-rap1200\(f\) -
ruijie rg-rap2260\(f\)_firmware ap_3.0\(1\)b11p218
ruijie rg-rap2260\(f\) -
ruijie rg-rap2200\(f\)_firmware ap_3.0\(1\)b11p218
ruijie rg-rap2200\(f\) -
ruijie rg-rap6260\(g\)_firmware ap_3.0\(1\)b11p218
ruijie rg-rap6260\(g\) -
ruijie rg-rap2260\(g\)_firmware ap_3.0\(1\)b11p218
ruijie rg-rap2260\(g\) -
ruijie rg-rap6260\(h\)-d_firmware ap_3.0\(1\)b11p218
ruijie rg-rap6260\(h\)-d -
ruijie rg-nbc256_firmware ac_3.0\(1\)b11p86
ruijie rg-nbc256 -
ruijie rg-nbc512_firmware ac_3.0\(1\)b11p86
ruijie rg-nbc512 -
ruijie rg-s1930-24gt4sfp_firmware 3.0\(1\)b11p218
ruijie rg-s1930-24gt4sfp -
ruijie rg-s1930-24t4sfp-p_firmware 3.0\(1\)b11p218
ruijie rg-s1930-24t4sfp-p -
ruijie rg-s1930-8gt2sfp_firmware 3.0\(1\)b11p218
ruijie rg-s1930-8gt2sfp -
ruijie rg-s1930-8gt2sfp-p_firmware 3.0\(1\)b11p218
ruijie rg-s1930-8gt2sfp-p -
ruijie rg-s1930-8t2sfp-p_firmware 3.0\(1\)b11p218
ruijie rg-s1930-8t2sfp-p -
ruijie rg-s1930-24t4sfp_firmware 3.0\(1\)b11p218
ruijie rg-s1930-24t4sfp -
ruijie rg-s1930-24gt4sfp-p_firmware 3.0\(1\)b11p218
ruijie rg-s1930-24gt4sfp-p -
ruijie rg-s1930-8t2sfp_firmware 3.0\(1\)b11p218
ruijie rg-s1930-8t2sfp -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-ew1200r_firmware:3.0\\(1\\)b11p204:*:*:*:*:*:*:*",
              "matchCriteriaId": "535D9736-5C99-464D-A36D-3C979B88D838",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-ew1200r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF605532-EA4B-4C10-88EE-E13FD3C36391",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-ew300_firmware:3.0\\(1\\)b11p204:*:*:*:*:*:*:*",
              "matchCriteriaId": "04F33FD1-A697-40AF-999C-1D0648B39704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-ew300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5E89B72-D675-4C2C-B03F-BCADB5A21DB5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-ew3200gx_firmware:3.0\\(1\\)b11p204:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABDC77C8-7607-4208-A57C-6F06A412833B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-ew3200gx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "260007FF-1C62-40CA-A149-1CFD445B77CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-ew1200g_firmware:3.0\\(1\\)b11p204:*:*:*:*:*:*:*",
              "matchCriteriaId": "C747DE31-43E6-4CD2-96E8-2B6C9A1BB8F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-ew1200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D49D3A7-F8C9-4273-B947-21B516DB5877",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-ew1800gx_firmware:3.0\\(1\\)b11p204:*:*:*:*:*:*:*",
              "matchCriteriaId": "290062BC-87BA-4F91-9773-24E9C8E0B2DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-ew1800gx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7BCCEA-3446-4E6C-90F2-3B8B09BCAD5D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-ew300r_firmware:3.0\\(1\\)b11p204:*:*:*:*:*:*:*",
              "matchCriteriaId": "01A0C2C2-ECC5-40C8-ACFC-954CA137BB9C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-ew300r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BA7D348-02CC-406E-90C0-C82628007616",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-ew1200_firmware:3.0\\(1\\)b11p204:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40FA6F3-F3F9-46CA-A6B9-04DF4467655D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-ew1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B785D7D6-91F2-484B-9052-A95CBF5557AF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg3000xe_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "993832B4-72BE-4545-97F0-52F18DE81183",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg3000xe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13B97B62-B757-48B5-9FE8-31CD941E17BA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg105g_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3300C5-4CF4-4001-AE7B-910FD472337C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg105g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEBFC706-AC97-4541-B2B5-1804A4A1DEFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg305gh-p-e_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BD1A69-B1CB-46CA-86EF-4FF3F0456EAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg305gh-p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F06A951-22E0-489C-86F8-F10659A58F84",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg105g-p_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "01ECF45E-0D62-4020-9AC0-E11D0DC02D43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg105g-p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7611947-CA1E-48C5-A79E-584EA174D4E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg3230_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E278531-11DB-451E-92C9-1581A7472EB1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg3230:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC572D3-B08D-4F28-A5A1-B8B86A9816D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg1000e_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "299A82E0-325D-4228-A591-DA6A1B4EA74F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg1000e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA58CE8C-9CEF-4990-B4F1-925B7B2F6CE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg105g-e_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "018D197F-FD45-49FC-B449-3C0D6086445A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg105g-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD536DA0-81D3-4D4A-A118-547B5A4F1EAD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg105gw\\(t\\)_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF42017-3BE4-41D3-B440-002324926274",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg105gw\\(t\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8489805-7913-441A-A234-FF81727145F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg105gw-x_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "01C66016-1A85-4A4A-A64E-227F34D2059C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg105gw-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DFC91E9-48B8-44B7-B3D1-8307AF28D2C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg2000ce_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6C68405-AEAC-4F8F-AD9E-AF4B5244C199",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg2000ce:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE2EBF3-6B54-4820-9B81-78C536C27EBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg2100-p_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "198D50AD-070A-4CF6-9508-BE21BA2C4012",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg2100-p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C143C34F-E3B0-4758-B5B2-940487C0DF9A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg209gs_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "30D1E3AE-D86C-461F-8EF6-26802DE1F810",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg209gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A19353AD-583C-45ED-B7E9-5A698957A58F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg310gh-e_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "261F64C4-8075-49EA-8D03-D332273199ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg310gh-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5689D7-078B-4009-A7CC-78E82012DECA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg3000eu_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "246C77FD-B976-4063-A024-EC1B1CDE6425",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg3000eu:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2091E90B-592D-4140-A601-6211824F294D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg210g-p_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "6826B7F7-9F5C-4501-92DF-733829BB4E41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg210g-p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "637BFC7A-BDAD-4FE3-A783-847B2790A289",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg3250_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D162D1D-B4CB-4657-A3DA-4EE262197104",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg3250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7473057D-92EF-49BC-9721-A69CA90DEF04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:re-eg1000m_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF0F8B92-952F-4CDF-9D6D-645BA3DCC122",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:re-eg1000m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEB5E565-5193-4FB1-9794-14B18380DAA0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-eg1000c_firmware:3.0\\(1\\)b11p216:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D428A3-FC96-4EB5-A04F-31A71D2E12F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-eg1000c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "392B0C18-CD2A-45F3-95DF-1E064B84AC24",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-nbs3100-48gt4sfp-p_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E3736D-4A29-471C-A1C6-16CCAA40128C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-nbs3100-48gt4sfp-p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC19DFA6-228F-409D-B256-FD6EBF8A2BF2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-nbs3200-24gt4xs_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A8E110-5413-40FF-8CCE-70D3C5E44A82",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-nbs3200-24gt4xs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C13B896-8851-492F-A10E-5EF018444249",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-nbs3200-24sfp_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "75CAFCF6-F6C6-45A6-B796-1A419108C2EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-nbs3200-24sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F5D9F8-92D4-4BFA-9568-645E2B719B47",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-nbs3200-8gt4xs_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0BEAF23-8C2D-4C04-9829-8F33EDD88DC3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-nbs3200-8gt4xs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5626436B-4175-4618-9B33-45F6F297E389",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-nbs3200-24gt4xs-p_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE61285E-71DD-4A71-B521-4610C025EEAD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-nbs3200-24gt4xs-p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B33924F9-91E4-4AA8-95CC-5BCE198E04CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-nbs3200-48gt4xs_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C00700F-2BC1-455D-AF11-5FC0A1E32990",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-nbs3200-48gt4xs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C51911B7-1B11-4898-9609-13051E679EEB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-nbs3200-48gt4xs-p_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "1482F636-4F64-407E-9512-74F09A333866",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-nbs3200-48gt4xs-p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F846A1C0-9E4E-4951-A80C-19BC4DC09432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-nbs3100-24gt4sfp_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3ACF25F-0938-41E8-BBFB-1FC68DE2F96F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-nbs3100-24gt4sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDA6B65-6A90-4F44-BCB5-16CD36D70F3B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-nbs3100-24gt4sfp-p_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "301960FD-E8B6-4E39-BD1E-E9CCFCF1DAFB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-nbs3100-24gt4sfp-p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77FC2A4C-E6B0-406E-9144-1CC992C5E54E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-nbs3100-8gt2sfp_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "25F4E880-7B6A-4FBD-BAF9-B0B526247F32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-nbs3100-8gt2sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70404EAA-7F2C-4183-AAD6-A38F179FCED4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-nbs3100-8gt2sfp-p_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "7834D6BE-D251-408B-8241-81A17F0B7EED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-nbs3100-8gt2sfp-p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A5497F-8957-4929-836A-27867CE45D80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap1260_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "665CABE1-14CF-4BC2-AC5A-704EEBCF37D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap1260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F737572-87F6-4769-A617-5CEF76D5F035",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap2266_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "252E58A4-8E04-4A50-B7F1-EDDEA0667B74",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap2266:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27550431-6FD0-42E2-B106-3DC9899A05FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap1261_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "065DA687-1130-499E-9B5D-7588B7E62C76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap1261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8153FADD-C6CC-4B45-B159-EBDA5B1A7C92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap73hd_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCEF6976-4BD1-4E2D-868A-CBD2F74FF36F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap73hd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D096714-288D-4226-BBA1-B700E0328D24",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap2200\\(e\\)_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0C9177-C24C-48DA-A382-CB981ABB439C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap2200\\(e\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD790BDC-9564-4A98-AF02-E4A8F6E6938B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap6260\\(h\\)_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D0B47A-81B7-4DA2-AEE6-D4D86E63F55A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap6260\\(h\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D85341-32D6-4A63-BE7A-2E0A43C69580",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap1200\\(p\\)_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5A2BD1E-17C5-494B-A9DF-8480C829689F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap1200\\(p\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28EF73B4-39D6-4343-A93C-378FDEDE7FCA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap2260\\(e\\)_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "11396A9B-8783-4234-99B4-1ED677EA3765",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap2260\\(e\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88182AA1-8108-4448-88ED-70A3E4CC7E59",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap6262\\(g\\)_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "61554DBE-71B8-44A7-A07C-F5D1216E1AFE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap6262\\(g\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DED1A82-20A0-4352-9D0F-EE4593EE4619",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap6262_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF51F1A1-B5CE-4232-B301-3705FFB8251D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap6262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF166B7E-CDBD-4D42-B993-48E330782469",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap2260_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "2678988D-116A-41B3-8483-2150FC241926",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap2260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8543162C-1AE8-42DD-B40D-8EC221CBD84A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap6202\\(g\\)_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C8ED018-6203-4087-9FA5-DD1162C4C246",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap6202\\(g\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D841BB3-B12F-4D4C-A5FA-4BED419D44D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap1201_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "793B39E7-9047-47F1-953A-D66000B6F733",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap1201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6657F6F-989F-4CD4-BC92-AB67E37625F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap1200\\(f\\)_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE0C6190-C66A-4C44-BAFF-8F16D9CCE01B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap1200\\(f\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC3647F2-D034-428B-939A-49824BEBD410",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap2260\\(f\\)_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "71416C75-885B-4145-807D-9057A847EB3B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap2260\\(f\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F870E2B-F37C-43DD-A7A1-EE0585B7C0C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap2200\\(f\\)_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C0A6CC0-4881-4AAB-B434-A44C186F7491",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap2200\\(f\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "330F8E65-A80D-4B52-AE7F-FAB36B0988D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap6260\\(g\\)_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BCDA9A7-DBEC-4DD0-907B-4D9CFBFAA404",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap6260\\(g\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D101FFC-FC74-4F84-B146-B43A2EA3FAA1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap2260\\(g\\)_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "5500289B-9D01-4C1B-B767-038639897B01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap2260\\(g\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D92462B7-B910-4007-8017-96131AF52F5F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-rap6260\\(h\\)-d_firmware:ap_3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "2929B324-D87C-47F9-B4B5-B3031089BF14",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-rap6260\\(h\\)-d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB899BAA-7A0C-4081-BB6A-458008149F7B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-nbc256_firmware:ac_3.0\\(1\\)b11p86:*:*:*:*:*:*:*",
              "matchCriteriaId": "25F8E00B-1E52-417C-A4A2-9B909412DA96",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-nbc256:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D18FCBF-684A-4842-A156-C5CEAFEACB4A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-nbc512_firmware:ac_3.0\\(1\\)b11p86:*:*:*:*:*:*:*",
              "matchCriteriaId": "0244F446-B58C-4D0D-B9FE-14DFFEE5C2FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-nbc512:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2965AC5-4D4C-40CD-BB2D-417A45BC44C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-s1930-24gt4sfp_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F2FB575-6788-4780-8FED-DF8331A18A7D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-s1930-24gt4sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9AAAEBC-5B39-45F2-B0E1-A4B650E41050",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-s1930-24t4sfp-p_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC4D0CD3-1552-4658-BB99-F211533555FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-s1930-24t4sfp-p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "099AC8F6-198B-4342-B635-5F7A75077562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-s1930-8gt2sfp_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "725CBA7C-4F7E-47F3-8502-04C94EAB1870",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-s1930-8gt2sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85ABD8CB-7294-43F7-84FC-043C235FE9B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-s1930-8gt2sfp-p_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "5725390C-7EAE-4921-85A9-E0D51F15D0B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-s1930-8gt2sfp-p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B48198B-C84C-466B-BE2D-9D7A78A7298E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-s1930-8t2sfp-p_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4936497-58D3-4F33-BF7A-1291F3B9F676",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-s1930-8t2sfp-p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04244E38-8A68-4B54-BFEA-9F0A63DAF90F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-s1930-24t4sfp_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "2712E355-CD9F-4CCB-8E09-F5633E57A85B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-s1930-24t4sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "473AAE27-2F18-48F5-8DD5-8E6B589B296B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-s1930-24gt4sfp-p_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F3EB657-D724-4006-B282-6F35F9F5ADB7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-s1930-24gt4sfp-p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD6B61F-5D9E-48F6-940A-97E438B7BB34",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-s1930-8t2sfp_firmware:3.0\\(1\\)b11p218:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11E6C99-66E1-4672-AA77-895C3F75F2C0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-s1930-8t2sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E38C46CD-46B0-4FED-A054-475571B3DF53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth."
    }
  ],
  "id": "CVE-2023-34644",
  "lastModified": "2024-11-21T08:07:28.933",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-31T14:15:10.323",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.ruijienetworks.com/support/securityBulletins/cybersecurity_bulletins/10001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.ruijienetworks.com/support/securityBulletins/cybersecurity_bulletins/10001"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-3306

Vulnerability from fkie_nvd - Published: 2023-06-18 08:15 - Updated: 2024-11-21 08:16
Summary
A vulnerability was found in Ruijie RG-EW1200G EW_3.0(1)B11P204. It has been declared as critical. This vulnerability affects unknown code of the file app.09df2a9e44ab48766f5f.js of the component Admin Password Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-231802 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Impacted products
Vendor Product Version
ruijie rg-ew1200g_firmware ew_3.0\(1\)b11p204
ruijie rg-ew1200g -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruijie:rg-ew1200g_firmware:ew_3.0\\(1\\)b11p204:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E23D3E-4A15-4766-BA4C-98E0679AFFFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruijie:rg-ew1200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D49D3A7-F8C9-4273-B947-21B516DB5877",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability was found in Ruijie RG-EW1200G EW_3.0(1)B11P204. It has been declared as critical. This vulnerability affects unknown code of the file app.09df2a9e44ab48766f5f.js of the component Admin Password Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-231802 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
    }
  ],
  "id": "CVE-2023-3306",
  "lastModified": "2024-11-21T08:16:58.427",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "cna@vuldb.com",
        "type": "Secondary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.4,
        "source": "cna@vuldb.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-06-18T08:15:09.287",
  "references": [
    {
      "source": "cna@vuldb.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/RCEraser/cve/blob/main/RG-EW1200G.md"
    },
    {
      "source": "cna@vuldb.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://vuldb.com/?ctiid.231802"
    },
    {
      "source": "cna@vuldb.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://vuldb.com/?id.231802"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/RCEraser/cve/blob/main/RG-EW1200G.md"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://vuldb.com/?ctiid.231802"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://vuldb.com/?id.231802"
    }
  ],
  "sourceIdentifier": "cna@vuldb.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "cna@vuldb.com",
      "type": "Secondary"
    }
  ]
}

CVE-2023-4169 (GCVE-0-2023-4169)

Vulnerability from cvelistv5 – Published: 2023-08-05 18:00 – Updated: 2024-08-02 07:17
VLAI?
Title
Ruijie RG-EW1200G Administrator Password set_passwd access control
Summary
A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-236185 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE
  • CWE-284 - Improper Access Controls
Assigner
References
https://vuldb.com/?id.236185 vdb-entrytechnical-description
https://vuldb.com/?ctiid.236185 signaturepermissions-required
https://github.com/blakespire/repoforcve/tree/mai… broken-linkexploit
Impacted products
Vendor Product Version
Ruijie RG-EW1200G Affected: 1.0(1)B1P5
Create a notification for this product.
Credits
t1nk3rl94e (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:17:12.329Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vdb-entry",
              "technical-description",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?id.236185"
          },
          {
            "tags": [
              "signature",
              "permissions-required",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?ctiid.236185"
          },
          {
            "tags": [
              "broken-link",
              "exploit",
              "x_transferred"
            ],
            "url": "https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Administrator Password Handler"
          ],
          "product": "RG-EW1200G",
          "vendor": "Ruijie",
          "versions": [
            {
              "status": "affected",
              "version": "1.0(1)B1P5"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "t1nk3rl94e (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-236185 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
        },
        {
          "lang": "de",
          "value": "In Ruijie RG-EW1200G 1.0(1)B1P5 wurde eine kritische Schwachstelle ausgemacht. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei /api/sys/set_passwd der Komponente Administrator Password Handler. Durch Manipulation mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 6.5,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Controls",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-13T07:41:32.696Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.236185"
        },
        {
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.236185"
        },
        {
          "tags": [
            "broken-link",
            "exploit"
          ],
          "url": "https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2023-08-04T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2023-08-04T00:00:00.000Z",
          "value": "CVE reserved"
        },
        {
          "lang": "en",
          "time": "2023-08-04T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2023-08-30T06:35:45.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Ruijie RG-EW1200G Administrator Password set_passwd access control"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2023-4169",
    "datePublished": "2023-08-05T18:00:06.874Z",
    "dateReserved": "2023-08-04T21:08:59.483Z",
    "dateUpdated": "2024-08-02T07:17:12.329Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-34644 (GCVE-0-2023-34644)

Vulnerability from cvelistv5 – Published: 2023-07-31 00:00 – Updated: 2024-10-22 18:34
VLAI?
Summary
Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:17:03.753Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.ruijienetworks.com/support/securityBulletins/cybersecurity_bulletins/10001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:ruijienetworks:rg-ew1200:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "rg-ew1200",
            "vendor": "ruijienetworks",
            "versions": [
              {
                "status": "affected",
                "version": "EW_3.0(1)B11P204"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:ruijienetworks:rg-s1930:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "rg-s1930",
            "vendor": "ruijienetworks",
            "versions": [
              {
                "status": "affected",
                "version": "SWITCH_3.0(1)B11P218"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:ruijienetworks:rg-eg350:1.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "rg-eg350",
            "vendor": "ruijienetworks",
            "versions": [
              {
                "status": "affected",
                "version": "EG_3.0(1)B11P216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:ruijienetworks:eap:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "eap",
            "vendor": "ruijienetworks",
            "versions": [
              {
                "status": "affected",
                "version": "AP_3.0(1)B11P218"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:ruijienetworks:rap:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "rap",
            "vendor": "ruijienetworks",
            "versions": [
              {
                "status": "affected",
                "version": "AP_3.0(1)B11P218"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:ruijienetworks:nbc:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nbc",
            "vendor": "ruijienetworks",
            "versions": [
              {
                "status": "affected",
                "version": "AC_3.0(1)B11P86"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34644",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T18:11:36.686277Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T18:34:33.619Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-13T17:21:04.915284",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/"
        },
        {
          "url": "https://www.ruijienetworks.com/support/securityBulletins/cybersecurity_bulletins/10001"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-34644",
    "datePublished": "2023-07-31T00:00:00",
    "dateReserved": "2023-06-07T00:00:00",
    "dateUpdated": "2024-10-22T18:34:33.619Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-3306 (GCVE-0-2023-3306)

Vulnerability from cvelistv5 – Published: 2023-06-18 08:00 – Updated: 2024-12-16 19:58
VLAI?
Title
Ruijie RG-EW1200G Admin Password app.09df2a9e44ab48766f5f.js access control
Summary
A vulnerability was found in Ruijie RG-EW1200G EW_3.0(1)B11P204. It has been declared as critical. This vulnerability affects unknown code of the file app.09df2a9e44ab48766f5f.js of the component Admin Password Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-231802 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE
  • CWE-284 - Improper Access Controls
Assigner
References
Impacted products
Vendor Product Version
Ruijie RG-EW1200G Affected: EW_3.0(1)B11P204
Create a notification for this product.
Credits
RCEraser (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:48:08.551Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vdb-entry",
              "technical-description",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?id.231802"
          },
          {
            "tags": [
              "signature",
              "permissions-required",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?ctiid.231802"
          },
          {
            "tags": [
              "exploit",
              "x_transferred"
            ],
            "url": "https://github.com/RCEraser/cve/blob/main/RG-EW1200G.md"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-3306",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-16T19:57:59.493782Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-16T19:58:23.915Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Admin Password Handler"
          ],
          "product": "RG-EW1200G",
          "vendor": "Ruijie",
          "versions": [
            {
              "status": "affected",
              "version": "EW_3.0(1)B11P204"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "analyst",
          "value": "RCEraser (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in Ruijie RG-EW1200G EW_3.0(1)B11P204. It has been declared as critical. This vulnerability affects unknown code of the file app.09df2a9e44ab48766f5f.js of the component Admin Password Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-231802 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
        },
        {
          "lang": "de",
          "value": "In Ruijie RG-EW1200G EW_3.0(1)B11P204 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei app.09df2a9e44ab48766f5f.js der Komponente Admin Password Handler. Durch Beeinflussen mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 7.5,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Controls",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-23T13:27:06.123Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.231802"
        },
        {
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.231802"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/RCEraser/cve/blob/main/RG-EW1200G.md"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2023-06-18T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2023-06-18T00:00:00.000Z",
          "value": "CVE reserved"
        },
        {
          "lang": "en",
          "time": "2023-06-18T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2023-07-14T17:39:30.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Ruijie RG-EW1200G Admin Password app.09df2a9e44ab48766f5f.js access control"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2023-3306",
    "datePublished": "2023-06-18T08:00:04.675Z",
    "dateReserved": "2023-06-18T07:00:10.368Z",
    "dateUpdated": "2024-12-16T19:58:23.915Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-4169 (GCVE-0-2023-4169)

Vulnerability from nvd – Published: 2023-08-05 18:00 – Updated: 2024-08-02 07:17
VLAI?
Title
Ruijie RG-EW1200G Administrator Password set_passwd access control
Summary
A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-236185 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE
  • CWE-284 - Improper Access Controls
Assigner
References
https://vuldb.com/?id.236185 vdb-entrytechnical-description
https://vuldb.com/?ctiid.236185 signaturepermissions-required
https://github.com/blakespire/repoforcve/tree/mai… broken-linkexploit
Impacted products
Vendor Product Version
Ruijie RG-EW1200G Affected: 1.0(1)B1P5
Create a notification for this product.
Credits
t1nk3rl94e (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:17:12.329Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vdb-entry",
              "technical-description",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?id.236185"
          },
          {
            "tags": [
              "signature",
              "permissions-required",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?ctiid.236185"
          },
          {
            "tags": [
              "broken-link",
              "exploit",
              "x_transferred"
            ],
            "url": "https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Administrator Password Handler"
          ],
          "product": "RG-EW1200G",
          "vendor": "Ruijie",
          "versions": [
            {
              "status": "affected",
              "version": "1.0(1)B1P5"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "t1nk3rl94e (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-236185 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
        },
        {
          "lang": "de",
          "value": "In Ruijie RG-EW1200G 1.0(1)B1P5 wurde eine kritische Schwachstelle ausgemacht. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei /api/sys/set_passwd der Komponente Administrator Password Handler. Durch Manipulation mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 6.5,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Controls",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-13T07:41:32.696Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.236185"
        },
        {
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.236185"
        },
        {
          "tags": [
            "broken-link",
            "exploit"
          ],
          "url": "https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2023-08-04T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2023-08-04T00:00:00.000Z",
          "value": "CVE reserved"
        },
        {
          "lang": "en",
          "time": "2023-08-04T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2023-08-30T06:35:45.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Ruijie RG-EW1200G Administrator Password set_passwd access control"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2023-4169",
    "datePublished": "2023-08-05T18:00:06.874Z",
    "dateReserved": "2023-08-04T21:08:59.483Z",
    "dateUpdated": "2024-08-02T07:17:12.329Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-34644 (GCVE-0-2023-34644)

Vulnerability from nvd – Published: 2023-07-31 00:00 – Updated: 2024-10-22 18:34
VLAI?
Summary
Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:17:03.753Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.ruijienetworks.com/support/securityBulletins/cybersecurity_bulletins/10001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:ruijienetworks:rg-ew1200:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "rg-ew1200",
            "vendor": "ruijienetworks",
            "versions": [
              {
                "status": "affected",
                "version": "EW_3.0(1)B11P204"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:ruijienetworks:rg-s1930:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "rg-s1930",
            "vendor": "ruijienetworks",
            "versions": [
              {
                "status": "affected",
                "version": "SWITCH_3.0(1)B11P218"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:ruijienetworks:rg-eg350:1.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "rg-eg350",
            "vendor": "ruijienetworks",
            "versions": [
              {
                "status": "affected",
                "version": "EG_3.0(1)B11P216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:ruijienetworks:eap:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "eap",
            "vendor": "ruijienetworks",
            "versions": [
              {
                "status": "affected",
                "version": "AP_3.0(1)B11P218"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:ruijienetworks:rap:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "rap",
            "vendor": "ruijienetworks",
            "versions": [
              {
                "status": "affected",
                "version": "AP_3.0(1)B11P218"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:ruijienetworks:nbc:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nbc",
            "vendor": "ruijienetworks",
            "versions": [
              {
                "status": "affected",
                "version": "AC_3.0(1)B11P86"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34644",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T18:11:36.686277Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T18:34:33.619Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-13T17:21:04.915284",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/"
        },
        {
          "url": "https://www.ruijienetworks.com/support/securityBulletins/cybersecurity_bulletins/10001"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-34644",
    "datePublished": "2023-07-31T00:00:00",
    "dateReserved": "2023-06-07T00:00:00",
    "dateUpdated": "2024-10-22T18:34:33.619Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-3306 (GCVE-0-2023-3306)

Vulnerability from nvd – Published: 2023-06-18 08:00 – Updated: 2024-12-16 19:58
VLAI?
Title
Ruijie RG-EW1200G Admin Password app.09df2a9e44ab48766f5f.js access control
Summary
A vulnerability was found in Ruijie RG-EW1200G EW_3.0(1)B11P204. It has been declared as critical. This vulnerability affects unknown code of the file app.09df2a9e44ab48766f5f.js of the component Admin Password Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-231802 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE
  • CWE-284 - Improper Access Controls
Assigner
References
Impacted products
Vendor Product Version
Ruijie RG-EW1200G Affected: EW_3.0(1)B11P204
Create a notification for this product.
Credits
RCEraser (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:48:08.551Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vdb-entry",
              "technical-description",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?id.231802"
          },
          {
            "tags": [
              "signature",
              "permissions-required",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?ctiid.231802"
          },
          {
            "tags": [
              "exploit",
              "x_transferred"
            ],
            "url": "https://github.com/RCEraser/cve/blob/main/RG-EW1200G.md"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-3306",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-16T19:57:59.493782Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-16T19:58:23.915Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Admin Password Handler"
          ],
          "product": "RG-EW1200G",
          "vendor": "Ruijie",
          "versions": [
            {
              "status": "affected",
              "version": "EW_3.0(1)B11P204"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "analyst",
          "value": "RCEraser (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in Ruijie RG-EW1200G EW_3.0(1)B11P204. It has been declared as critical. This vulnerability affects unknown code of the file app.09df2a9e44ab48766f5f.js of the component Admin Password Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-231802 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
        },
        {
          "lang": "de",
          "value": "In Ruijie RG-EW1200G EW_3.0(1)B11P204 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei app.09df2a9e44ab48766f5f.js der Komponente Admin Password Handler. Durch Beeinflussen mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 7.5,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Controls",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-23T13:27:06.123Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.231802"
        },
        {
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.231802"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/RCEraser/cve/blob/main/RG-EW1200G.md"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2023-06-18T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2023-06-18T00:00:00.000Z",
          "value": "CVE reserved"
        },
        {
          "lang": "en",
          "time": "2023-06-18T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2023-07-14T17:39:30.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Ruijie RG-EW1200G Admin Password app.09df2a9e44ab48766f5f.js access control"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2023-3306",
    "datePublished": "2023-06-18T08:00:04.675Z",
    "dateReserved": "2023-06-18T07:00:10.368Z",
    "dateUpdated": "2024-12-16T19:58:23.915Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}