A vulnerability, which was classified as critical, has been found in Ruijie RG-EG350 up to 20240318. Affected by this issue is the function vpnAction of the file /itbox_pi/vpn_quickset_service.php?a=set_vpn of the component HTTP POST Request Handler. The manipulation of the argument ip/port/user/pass/dns/startIp leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257978 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20Management%20System%20Exists%20Remote%20Code%20Execution%20Vulnerability_vpn_quickset_service.php.pdf | Broken Link |
| https://vuldb.com/?ctiid.257978 | Permissions Required VDB Entry |
| https://vuldb.com/?id.257978 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.300372 | Third Party Advisory VDB Entry |
| https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20Management%20System%20Exists%20Remote%20Code%20Execution%20Vulnerability_vpn_quickset_service.php.pdf | Broken Link |
| https://vuldb.com/?ctiid.257978 | Permissions Required VDB Entry |
| https://vuldb.com/?id.257978 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.300372 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
03 Nov 2025, 17:03
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Ruijie rg-eg350 Firmware
Ruijie Ruijie rg-eg350 |
|
| References | () https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20Management%20System%20Exists%20Remote%20Code%20Execution%20Vulnerability_vpn_quickset_service.php.pdf - Broken Link | |
| References | () https://vuldb.com/?ctiid.257978 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.257978 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.300372 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:o:ruijie:rg-eg350_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg350:-:*:*:*:*:*:*:* |
21 Nov 2024, 09:10
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20Management%20System%20Exists%20Remote%20Code%20Execution%20Vulnerability_vpn_quickset_service.php.pdf - | |
| References | () https://vuldb.com/?ctiid.257978 - | |
| References | () https://vuldb.com/?id.257978 - | |
| References | () https://vuldb.com/?submit.300372 - |
26 Mar 2024, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-03-26 21:15
Updated : 2025-11-03 17:03
NVD link : CVE-2024-2910
Mitre link : CVE-2024-2910
CVE.ORG link : CVE-2024-2910
JSON object : View
Products Affected
ruijie
- rg-eg350
- rg-eg350_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
