Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-7304: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Ruijie Networks Co., Ltd. RG-UAC

0
Critical
VulnerabilityCVE-2023-7304cvecve-2023-7304cwe-78
Published: Wed Oct 15 2025 (10/15/2025, 01:22:10 UTC)
Source: CVE Database V5
Vendor/Project: Ruijie Networks Co., Ltd.
Product: RG-UAC

Description

Ruijie RG-UAC Application Management Gateway contains a command injection vulnerability via the 'nmc_sync.php' interface. An unauthenticated attacker able to reach the affected endpoint can inject shell commands via crafted request data, causing the application to execute arbitrary commands on the host. Successful exploitation can yield full control of the application process and may lead to system-level access depending on the service privileges. VulnCheck has observed this vulnerability being targeted by the Rondo botnet.

AI-Powered Analysis

AILast updated: 10/15/2025, 02:08:05 UTC

Technical Analysis

CVE-2023-7304 is an OS command injection vulnerability classified under CWE-78 affecting all versions of Ruijie Networks' RG-UAC Application Management Gateway. The flaw resides in the 'nmc_sync.php' interface, which improperly neutralizes special elements in user-supplied input, allowing an attacker to inject arbitrary shell commands. Since the vulnerability requires no authentication (AV:N/AC:L/PR:N/UI:N), any attacker able to reach the endpoint can exploit it remotely. Successful exploitation results in the application executing attacker-controlled commands with the privileges of the RG-UAC process, potentially escalating to system-level access if the service runs with elevated rights. The vulnerability's CVSS 4.0 score of 9.3 reflects its critical nature, with high impact on confidentiality, integrity, and availability. Although no official patches have been released yet, the vulnerability is actively targeted by the Rondo botnet, indicating exploitation attempts in the wild. The RG-UAC product is typically deployed in enterprise environments for network access control, making this vulnerability a significant risk vector for network compromise and lateral movement within affected organizations.

Potential Impact

For European organizations, exploitation of CVE-2023-7304 could lead to complete compromise of network access control infrastructure, undermining network segmentation and security policies. Attackers gaining control over RG-UAC devices can manipulate authentication and authorization mechanisms, potentially allowing unauthorized network access, data exfiltration, or deployment of further malware. Critical sectors such as finance, telecommunications, government, and energy that rely on Ruijie RG-UAC for network security are at heightened risk. The vulnerability's ease of exploitation and lack of authentication requirements increase the likelihood of widespread attacks. Additionally, the presence of the Rondo botnet targeting this vulnerability suggests active exploitation attempts, which could lead to service disruptions or persistent footholds in affected networks. The impact extends beyond the compromised device to the broader network environment, threatening confidentiality, integrity, and availability of organizational IT assets.

Mitigation Recommendations

1. Immediately restrict network access to the 'nmc_sync.php' interface by implementing firewall rules or access control lists to allow only trusted management IPs. 2. Deploy network segmentation to isolate RG-UAC devices from general user networks and the internet to reduce exposure. 3. Monitor network traffic and logs for unusual requests targeting the 'nmc_sync.php' endpoint or signs of command injection attempts. 4. Engage Ruijie Networks support to obtain official patches or recommended workarounds as soon as they become available. 5. If patching is delayed, consider disabling or limiting the functionality of the vulnerable interface if feasible without disrupting operations. 6. Conduct thorough audits of RG-UAC devices for signs of compromise, especially if the Rondo botnet or similar threats are active in your environment. 7. Implement intrusion detection systems with signatures for known exploitation attempts targeting this CVE. 8. Educate network and security teams about this vulnerability to ensure rapid response to alerts and incidents related to RG-UAC devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-07-24T13:59:10.308Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68eefe3955734f1608e6823b

Added to database: 10/15/2025, 1:51:53 AM

Last enriched: 10/15/2025, 2:08:05 AM

Last updated: 10/15/2025, 10:05:04 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats