CVE-2023-38902
high-risk
Published 2023-08-17
A command injection vulnerability in RG-EW series home routers and repeaters v.EW_3.0(1)B11P219, RG-NBS and RG-S1930 series switches v.SWITCH_3.0(1)B11P219, RG-EG series business VPN routers v.EG_3.0(1)B11P219, EAP and RAP series wireless access points v.AP_3.0(1)B11P219, and NBC series wireless controllers v.AC_3.0(1)B11P219 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /cgi-bin/luci/api/cmd via the remoteIp field.
Do I need to act?
~
1.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Rg-Ew1200 Firmware
Rg-Ew1200G Pro Firmware
Rg-Ew1200R Firmware
Rg-Ew1300G Firmware
Rg-Ew1800Gx Pro Firmware
Rg-Ew3000Gx Pro Firmware
Rg-Ew300 Pro Firmware
Rg-Ew300R Firmware
Rg-Ew3200Gx Pro Firmware
Rg-Nb3200-24Gt4Xs Firmware
Rg-Nbs1850Gc Firmware
Rg-Nbs1850Gc V2 Firmware
Rg-Nbs2000 Firmware
Rg-Nbs2009G-P Firmware
Rg-Nbs200 Firmware
Rg-Nbs2026G-P Firmware
Rg-Nbs2026G Firmware
Rg-Nbs226F Firmware
Rg-Nbs228F Firmware
Rg-Nbs252F Firmware
Affected Vendors
References (2)
64
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
4/34 · Minimal
Exposure
30/34 · Critical