First published: Mon Aug 05 2024(Updated: )
A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 and classified as critical. Affected by this issue is the function sslvpn_config_mod of the file /vpn/list_ip_network.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273560. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Raisecom Msg2300 Firmware | =3.90 | |
Raisecom Msg2300 | ||
All of | ||
Raisecom Msg2100e Firmware | =3.90 | |
Raisecom Msg2100e | ||
All of | ||
Raisecom Msg2200 Firmware | =3.90 | |
Raisecom Msg2200 | ||
All of | ||
Raisecom Msg1200 Firmware | =3.90 | |
Raisecom MSG1200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7467 is classified as a critical vulnerability.
CVE-2024-7467 affects the Web Interface function sslvpn_config_mod in the firmware versions of Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300.
To fix CVE-2024-7467, upgrade to a patched version of the firmware that addresses this vulnerability.
The affected versions in CVE-2024-7467 are specifically version 3.90 of Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 firmware.
CVE-2024-7467 represents a critical vulnerability in the Raisecom MSG series that requires prompt attention.