FKIE_CVE-2024-55516
Vulnerability from fkie_nvd - Published: 2024-12-17 20:15 - Updated: 2025-04-28 17:13
Severity ?
Summary
A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 v3.90. The component affected by this issue is /upload_sysconfig.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060 | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| raisecom | msg2300_firmware | 3.90 | |
| raisecom | msg2300 | - | |
| raisecom | msg2100e_firmware | 3.90 | |
| raisecom | msg2100e | - | |
| raisecom | msg2200_firmware | 3.90 | |
| raisecom | msg2200 | - | |
| raisecom | msg1200_firmware | 3.90 | |
| raisecom | msg1200 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:raisecom:msg2300_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "3694F82E-0BB6-478B-B172-ADFCC42065EE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:raisecom:msg2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33BE02D1-DA11-4667-BAE6-576845174487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:raisecom:msg2100e_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "2E07731B-950C-4A1C-88B6-14009D839D96",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:raisecom:msg2100e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82FD4752-10DA-46CE-9EC4-C394AA1DABBE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:raisecom:msg2200_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADA8A53-1B6A-40C4-A5CB-3FF4817BDD93",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:raisecom:msg2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E37A21A-A798-4C25-85DB-4E46FE02166A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:raisecom:msg1200_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E67FFD88-D668-403E-8F09-5D82A4F962BD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:raisecom:msg1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4A1542B-B66C-44FC-8512-2365333B1A3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 v3.90. The component affected by this issue is /upload_sysconfig.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Raisecom MSG1200, MSG2100E, MSG2200 y MSG2300 v3.90. El componente afectado por este problema es /upload_sysconfig.php en la interfaz web. Al manipular un nombre de formulario adecuado, se pueden cargar archivos arbitrarios, lo que puede provocar un acceso no autorizado a los permisos del servidor."
}
],
"id": "CVE-2024-55516",
"lastModified": "2025-04-28T17:13:43.887",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-12-17T20:15:23.020",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…