Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-53881: Cleartext Transmission of Sensitive Information in Ruijie ReyeeOS

0
Critical
VulnerabilityCVE-2023-53881cvecve-2023-53881
Published: Mon Dec 15 2025 (12/15/2025, 20:28:19 UTC)
Source: CVE Database V5
Vendor/Project: Ruijie
Product: ReyeeOS

Description

ReyeeOS 1.204.1614 contains an unencrypted CWMP communication vulnerability that allows attackers to intercept and manipulate device communication through a man-in-the-middle attack. Attackers can create a fake CWMP server to inject and execute arbitrary commands on Ruijie Reyee Cloud devices by exploiting the unprotected HTTP polling requests.

AI-Powered Analysis

AILast updated: 12/15/2025, 21:00:53 UTC

Technical Analysis

CVE-2023-53881 affects Ruijie ReyeeOS version 1.204.1614 by exposing an unencrypted CWMP (CPE WAN Management Protocol) communication channel. CWMP is commonly used for remote management of network devices, including routers and gateways. In this vulnerability, the HTTP polling requests from devices to the management server are transmitted in cleartext, lacking encryption and authentication. This enables an attacker positioned on the network path to intercept these communications and conduct a man-in-the-middle (MitM) attack. By setting up a rogue CWMP server, the attacker can respond to device requests with malicious payloads, injecting arbitrary commands that the device executes. This can lead to full compromise of the device, allowing control over its functions, data interception, or disruption of network services. The vulnerability requires no user interaction and no prior authentication, increasing its risk. The CVSS v4.0 score of 9.2 reflects the critical nature, with network attack vector, high impact on confidentiality, integrity, and availability, and no privileges or user interaction needed. Although no exploits are currently known in the wild, the ease of exploitation and severity make this a significant threat. The lack of encryption in CWMP communication is a fundamental protocol weakness in this implementation, emphasizing the need for secure management channels. The vulnerability is specific to version 1.204.1614 of ReyeeOS, so other versions may not be affected. No official patches or mitigation links are currently published, indicating a need for vendor response and interim defensive measures.

Potential Impact

For European organizations, this vulnerability threatens the security of network infrastructure devices running ReyeeOS 1.204.1614. Successful exploitation can lead to unauthorized command execution, device takeover, and potential lateral movement within corporate networks. Confidential data transmitted through these devices can be intercepted or altered, compromising privacy and data integrity. Disruption or manipulation of network devices can degrade availability of critical services, impacting business operations. Sectors such as telecommunications, government, finance, and critical infrastructure that rely on secure network management are particularly at risk. The vulnerability could also be leveraged as a foothold for broader attacks, including espionage or ransomware deployment. Given the high CVSS score and no authentication required, the threat is severe. European organizations with remote device management using Reyee Cloud services must consider the risk of MitM attacks on their management traffic, especially if devices are deployed in untrusted or public networks. The absence of encryption in CWMP communication exposes sensitive management commands and device configurations to interception and manipulation.

Mitigation Recommendations

1. Immediately inventory all Ruijie ReyeeOS devices and verify firmware versions; prioritize those running version 1.204.1614. 2. Monitor Ruijie vendor advisories for official patches or firmware updates addressing CVE-2023-53881 and apply them promptly once available. 3. Until patches are released, implement network segmentation to isolate affected devices from untrusted networks and restrict management traffic to trusted paths only. 4. Employ network-level encryption such as VPN tunnels or IPsec to protect CWMP communication channels from interception. 5. Use network intrusion detection/prevention systems (IDS/IPS) to detect anomalous CWMP traffic patterns indicative of MitM or rogue server activity. 6. Disable or restrict remote management features if not strictly necessary, or enforce strong authentication and encrypted management protocols where possible. 7. Conduct regular security audits and penetration tests focusing on network device management interfaces. 8. Educate network administrators about the risks of unencrypted management protocols and encourage vigilance for suspicious device behavior. 9. Maintain comprehensive logging of device management communications to facilitate incident investigation. 10. Collaborate with Ruijie support for guidance and early access to security updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-13T14:25:04.999Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69407360d9bcdf3f3d00c3dd

Added to database: 12/15/2025, 8:45:20 PM

Last enriched: 12/15/2025, 9:00:53 PM

Last updated: 12/17/2025, 1:38:51 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats