CVE-2019-16639

An issue was found on the Ruijie EG-2000 series gateway. There is a newcli.php API interface without access control, which can allow an attacker (who only has web interface access) to use TELNET commands and/or show admin passwords via the mode_url=exec&command= substring. This affects EG-2000SE EG_RGOS 11.9 B11P1.
References
Link Resource
https://0x.mk/?p=239 Third Party Advisory Exploit
https://0x.mk/?p=239 Third Party Advisory Exploit
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ruijie:eg-2000se_firmware:11.9_b11p1:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:eg-2000se:-:*:*:*:*:*:*:*

History

09 Jul 2025, 17:00

Type Values Removed Values Added
CPE cpe:2.3:h:ruijie:eg-2000se:-:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:eg-2000se_firmware:11.9_b11p1:*:*:*:*:*:*:*
References () https://0x.mk/?p=239 - () https://0x.mk/?p=239 - Third Party Advisory, Exploit
First Time Ruijie eg-2000se
Ruijie eg-2000se Firmware
Ruijie

Information

Published : 2024-07-16 17:15

Updated : 2025-07-09 17:00


NVD link : CVE-2019-16639

Mitre link : CVE-2019-16639

CVE.ORG link : CVE-2019-16639


JSON object : View

Products Affected

ruijie

  • eg-2000se_firmware
  • eg-2000se
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')