Skip to content

Instantly share code, notes, and snippets.

@smrx86
Last active January 20, 2025 03:35
Show Gist options
  • Save smrx86/2008111b12ab47882b3928d0cbc9e415 to your computer and use it in GitHub Desktop.
Save smrx86/2008111b12ab47882b3928d0cbc9e415 to your computer and use it in GitHub Desktop.
[CVE-2024-42936] RG-EW300n Vulnerability, Remote code execution via intercept and modified MQTT message.

Information

Vendor of the products: RUIJIE

Vendor's website: https://reyee.ruijie.com/en-global/

Reported by: smrx86

Affected products: RG-EW300N

Affected firmware version: ReyeeOS 1.300.1422

Affected Component:mqlink.elf services

Firmware download address: https://reyee.ruijie.com/en-global/resources/software/ew300n-firmware/ew300n-b11p300- firmware/

Fixed f/w: ReyeeOS 1.313.2406

Overview

RG-EW300N with f/w ReyeeOS 1.300.1422 have RCE vulnerability via intercept and modified MQTT broker message to run shell command.

POC

This file has been truncated, but you can view the full file.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment