Unknown
CVE-2023-34644
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-34644
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- ruijie
Products
- re-eg1000m firmware 3.0(1)b11p216,
- rg-eg1000c firmware 3.0(1)b11p216,
- rg-eg1000e firmware 3.0(1)b11p216,
- rg-eg105g firmware 3.0(1)b11p216,
- rg-eg105g-e firmware 3.0(1)b11p216,
- rg-eg105g-p firmware 3.0(1)b11p216,
- rg-eg105gw(t) firmware 3.0(1)b11p216,
- rg-eg105gw-x firmware 3.0(1)b11p216,
- rg-eg2000ce firmware 3.0(1)b11p216,
- rg-eg209gs firmware 3.0(1)b11p216,
- rg-eg2100-p firmware 3.0(1)b11p216,
- rg-eg210g-p firmware 3.0(1)b11p216,
- rg-eg3000eu firmware 3.0(1)b11p216,
- rg-eg3000xe firmware 3.0(1)b11p216,
- rg-eg305gh-p-e firmware 3.0(1)b11p216,
- rg-eg310gh-e firmware 3.0(1)b11p216,
- rg-eg3230 firmware 3.0(1)b11p216,
- rg-eg3250 firmware 3.0(1)b11p216,
- rg-ew1200 firmware 3.0(1)b11p204,
- rg-ew1200g firmware 3.0(1)b11p204,
- rg-ew1200r firmware 3.0(1)b11p204,
- rg-ew1800gx firmware 3.0(1)b11p204,
- rg-ew300 firmware 3.0(1)b11p204,
- rg-ew300r firmware 3.0(1)b11p204,
- rg-ew3200gx firmware 3.0(1)b11p204,
- rg-nbc256 firmware ac 3.0(1)b11p86,
- rg-nbc512 firmware ac 3.0(1)b11p86,
- rg-nbs3100-24gt4sfp firmware 3.0(1)b11p218,
- rg-nbs3100-24gt4sfp-p firmware 3.0(1)b11p218,
- rg-nbs3100-48gt4sfp-p firmware 3.0(1)b11p218,
- rg-nbs3100-8gt2sfp firmware 3.0(1)b11p218,
- rg-nbs3100-8gt2sfp-p firmware 3.0(1)b11p218,
- rg-nbs3200-24gt4xs firmware 3.0(1)b11p218,
- rg-nbs3200-24gt4xs-p firmware 3.0(1)b11p218,
- rg-nbs3200-24sfp firmware 3.0(1)b11p218,
- rg-nbs3200-48gt4xs firmware 3.0(1)b11p218,
- rg-nbs3200-48gt4xs-p firmware 3.0(1)b11p218,
- rg-nbs3200-8gt4xs firmware 3.0(1)b11p218,
- rg-rap1200(f) firmware ap 3.0(1)b11p218,
- rg-rap1200(p) firmware ap 3.0(1)b11p218,
- rg-rap1201 firmware ap 3.0(1)b11p218,
- rg-rap1260 firmware ap 3.0(1)b11p218,
- rg-rap1261 firmware ap 3.0(1)b11p218,
- rg-rap2200(e) firmware ap 3.0(1)b11p218,
- rg-rap2200(f) firmware ap 3.0(1)b11p218,
- rg-rap2260 firmware ap 3.0(1)b11p218,
- rg-rap2260(e) firmware ap 3.0(1)b11p218,
- rg-rap2260(f) firmware ap 3.0(1)b11p218,
- rg-rap2260(g) firmware ap 3.0(1)b11p218,
- rg-rap2266 firmware ap 3.0(1)b11p218,
- rg-rap6202(g) firmware ap 3.0(1)b11p218,
- rg-rap6260(g) firmware ap 3.0(1)b11p218,
- rg-rap6260(h) firmware ap 3.0(1)b11p218,
- rg-rap6260(h)-d firmware ap 3.0(1)b11p218,
- rg-rap6262 firmware ap 3.0(1)b11p218,
- rg-rap6262(g) firmware ap 3.0(1)b11p218,
- rg-rap73hd firmware ap 3.0(1)b11p218,
- rg-s1930-24gt4sfp firmware 3.0(1)b11p218,
- rg-s1930-24gt4sfp-p firmware 3.0(1)b11p218,
- rg-s1930-24t4sfp firmware 3.0(1)b11p218,
- rg-s1930-24t4sfp-p firmware 3.0(1)b11p218,
- rg-s1930-8gt2sfp firmware 3.0(1)b11p218,
- rg-s1930-8gt2sfp-p firmware 3.0(1)b11p218,
- rg-s1930-8t2sfp firmware 3.0(1)b11p218,
- rg-s1930-8t2sfp-p firmware 3.0(1)b11p218
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: