CVE-2021-43160

A Remote Code Execution (RCE) vulnerability exists in Ruijie Networks Ruijie RG-EW Series Routers up to ReyeeOS 1.55.1915 / EW_3.0(1)B11P55 via the switchFastDhcp function in /cgi-bin/luci/api/diagnose.
References
Link Resource
http://ruijie.com Not Applicable
https://seclists.org/fulldisclosure/2022/May/0 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ruijienetworks:reyeeos:*:*:*:*:*:*:*:*
OR cpe:2.3:h:ruijienetworks:rg-ew1200:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijienetworks:rg-ew1200g_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijienetworks:rg-ew1800gx_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijienetworks:rg-ew300_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijienetworks:rg-ew3200gx_pro:-:*:*:*:*:*:*:*

History

12 May 2022, 19:04

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8
CWE CWE-77
References (MISC) http://ruijie.com - (MISC) http://ruijie.com - Not Applicable
References (MISC) https://seclists.org/fulldisclosure/2022/May/0 - (MISC) https://seclists.org/fulldisclosure/2022/May/0 - Mailing List, Third Party Advisory
CPE cpe:2.3:h:ruijienetworks:rg-ew1200:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijienetworks:rg-ew1200g_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijienetworks:rg-ew3200gx_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijienetworks:rg-ew1800gx_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijienetworks:rg-ew300_pro:-:*:*:*:*:*:*:*
cpe:2.3:o:ruijienetworks:reyeeos:*:*:*:*:*:*:*:*
First Time Ruijienetworks reyeeos
Ruijienetworks rg-ew300 Pro
Ruijienetworks rg-ew3200gx Pro
Ruijienetworks rg-ew1200
Ruijienetworks rg-ew1200g Pro
Ruijienetworks rg-ew1800gx Pro
Ruijienetworks

04 May 2022, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-04 01:15

Updated : 2023-12-10 14:22


NVD link : CVE-2021-43160

Mitre link : CVE-2021-43160

CVE.ORG link : CVE-2021-43160


JSON object : View

Products Affected

ruijienetworks

  • reyeeos
  • rg-ew300_pro
  • rg-ew1200g_pro
  • rg-ew1200
  • rg-ew3200gx_pro
  • rg-ew1800gx_pro
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')