An issue was found on the Ruijie EG-2000 series gateway. There is a newcli.php API interface without access control, which can allow an attacker (who only has web interface access) to use TELNET commands and/or show admin passwords via the mode_url=exec&command= substring. This affects EG-2000SE EG_RGOS 11.9 B11P1.
References
Link | Resource |
---|---|
https://0x.mk/?p=239 | Third Party Advisory Exploit |
https://0x.mk/?p=239 | Third Party Advisory Exploit |
Configurations
Configuration 1 (hide)
AND |
|
History
09 Jul 2025, 17:00
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:ruijie:eg-2000se:-:*:*:*:*:*:*:* cpe:2.3:o:ruijie:eg-2000se_firmware:11.9_b11p1:*:*:*:*:*:*:* |
|
References | () https://0x.mk/?p=239 - Third Party Advisory, Exploit | |
First Time |
Ruijie eg-2000se
Ruijie eg-2000se Firmware Ruijie |
Information
Published : 2024-07-16 17:15
Updated : 2025-07-09 17:00
NVD link : CVE-2019-16639
Mitre link : CVE-2019-16639
CVE.ORG link : CVE-2019-16639
JSON object : View
Products Affected
ruijie
- eg-2000se_firmware
- eg-2000se
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')