Remote Command Injection Vulnerability in RG-EW Series Home Routers and Repeaters v.EW_3.0(1)B11P219, RG-NBS and RG-S1930 Series Switches v.SWITCH_3.0(1)B11P219, RG-EG Series Business VPN Routers v.EG_3.0(1)B11P219, EAP and RAP Series Wireless Access Points v.AP_3.0(1)B11P219, and NBC Series Wireless Controllers v.AC_3.0(1)B11P219

Remote Command Injection Vulnerability in RG-EW Series Home Routers and Repeaters v.EW_3.0(1)B11P219, RG-NBS and RG-S1930 Series Switches v.SWITCH_3.0(1)B11P219, RG-EG Series Business VPN Routers v.EG_3.0(1)B11P219, EAP and RAP Series Wireless Access Points v.AP_3.0(1)B11P219, and NBC Series Wireless Controllers v.AC_3.0(1)B11P219

CVE-2023-38902 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

A command injection vulnerability in RG-EW series home routers and repeaters v.EW_3.0(1)B11P219, RG-NBS and RG-S1930 series switches v.SWITCH_3.0(1)B11P219, RG-EG series business VPN routers v.EG_3.0(1)B11P219, EAP and RAP series wireless access points v.AP_3.0(1)B11P219, and NBC series wireless controllers v.AC_3.0(1)B11P219 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /cgi-bin/luci/api/cmd via the remoteIp field.

Learn more about our Api Penetration Testing.