CVE-2023-34644
high-risk
Published 2023-07-31
Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth.
Do I need to act?
~
8.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
Rg-Ew1200R Firmware
Rg-Ew300 Firmware
Rg-Ew3200Gx Firmware
Rg-Ew1800Gx Firmware
Rg-Ew300R Firmware
Rg-Ew1200 Firmware
Rg-Eg3000Xe Firmware
Rg-Eg105G Firmware
Rg-Eg305Gh-P-E Firmware
Rg-Eg105G-P Firmware
Rg-Eg3230 Firmware
Rg-Eg1000E Firmware
Rg-Eg105G-E Firmware
Rg-Eg105Gw\(T\) Firmware
Rg-Eg105Gw-X Firmware
Rg-Eg2000Ce Firmware
Rg-Eg2100-P Firmware
Rg-Eg209Gs Firmware
Rg-Eg310Gh-E Firmware
Affected Vendors
69
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
10/34 · Low
Exposure
27/34 · High