CVE-2023-7304
Ruijie RG-UAC Application Management Gateway contains a command injection vulnerability
Description
Description
Ruijie RG-UAC Application Management Gateway contains a command injection vulnerability via the 'nmc_sync.php' interface. An unauthenticated attacker able to reach the affected endpoint can inject shell commands via crafted request data, causing the application to execute arbitrary commands on the host. Successful exploitation can yield full control of the application process and may lead to system-level access depending on the service privileges. VulnCheck has observed this vulnerability being targeted by the RondoDox botnet campaign.
CVSS Scores
EPSS Scores
Probability: | |
Percentile: |
Affected Vendors & Products
Vendor | Product | Version |
---|---|---|
ruijie | rg-uac_application_management_gateway | * |
Helpful Resources
Exploitability
CWE ID | Description |
---|---|
CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
How can this vulnerability impact me? :
How can this vulnerability be detected on my network or system? Can you suggest some commands?
What immediate steps should I take to mitigate this vulnerability?
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart
Meta Information
CVE Publication Date:
2025-10-15
CVE Last Modified Date:
2025-10-15
Report Generation Date:
2025-10-18
AI Powered Q&A Generation:
2025-10-15
EPSS Last Evaluated Date:
N/A
NVD Report Link: