A vulnerability was found in Raisecom Multi-Service...
Moderate severity
Unreviewed
Published
Feb 21, 2025
to the GitHub Advisory Database
•
Updated Feb 21, 2025
Description
Published by the National Vulnerability Database
Feb 21, 2025
Published to the GitHub Advisory Database
Feb 21, 2025
Last updated
Feb 21, 2025
A vulnerability was found in Raisecom Multi-Service Intelligent Gateway up to 20250208. It has been declared as critical. This vulnerability affects unknown code of the file /vpn/vpn_template_style.php of the component Request Parameter Handler. The manipulation of the argument stylenum leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References