{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9424","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-25T09:25:33.907Z","datePublished":"2025-08-25T22:32:10.274Z","dateUpdated":"2025-08-26T14:23:11.485Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-26T02:37:48.890Z"},"title":"Ruijie WS7204-A branch_import.php os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"Ruijie","product":"WS7204-A","versions":[{"version":"2017.06.15","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in Ruijie WS7204-A 2017.06.15. Affected by this vulnerability is an unknown functionality of the file /itbox_pi/branch_import.php?a=branch_list. Such manipulation of the argument province leads to os command injection. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In Ruijie WS7204-A 2017.06.15 ist eine Schwachstelle entdeckt worden. Dabei betrifft es einen unbekannter Codeteil der Datei /itbox_pi/branch_import.php?a=branch_list. Durch das Beeinflussen des Arguments province mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Die Schwachstelle wurde öffentlich offengelegt und könnte ausgenutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-25T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-26T04:42:44.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"huangweigang (VulDB User)","type":"reporter"},{"lang":"en","value":"huangweigang (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.321267","name":"VDB-321267 | Ruijie WS7204-A branch_import.php os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.321267","name":"VDB-321267 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.634135","name":"Submit #634135 | Ruijie WS7204-A 2017.06.15 command execution","tags":["third-party-advisory"]},{"url":"https://github.com/Hwwg/cve/issues/1","tags":["exploit","issue-tracking"]}]},"adp":[{"references":[{"url":"https://github.com/Hwwg/cve/issues/1","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-26T14:23:08.685731Z","id":"CVE-2025-9424","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-26T14:23:11.485Z"}}]}}