CVE-2025-34057: CWE-306 Missing Authentication for Critical Function in Ruijie NBR Router
An information disclosure vulnerability exists in Ruijie NBR series routers (known to affect NBR2000G, NBR1300G, and NBR1000 models) via the /WEB_VMS/LEVEL15/ endpoint. By crafting a specific POST request with modified Cookie headers and specially formatted parameters, an unauthenticated attacker can retrieve administrative account credentials in plaintext. This flaw allows direct disclosure of sensitive user data due to improper authentication checks and insecure backend logic. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
AI Analysis
Technical Summary
CVE-2025-34057 is a critical information disclosure vulnerability in Ruijie NBR series routers (models NBR2000G, NBR1300G, and NBR1000). The vulnerability stems from missing authentication on the /WEB_VMS/LEVEL15/ endpoint, which allows unauthenticated attackers to craft specific POST requests with manipulated Cookie headers and specially formatted parameters. This flaw enables attackers to retrieve administrative account credentials in plaintext, bypassing any authentication mechanisms due to improper backend logic and lack of access control. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), indicating a fundamental security design failure. The CVSS 4.0 base score is 8.7, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. The Shadowserver Foundation observed exploitation attempts on 2025-02-05, confirming active targeting. The vulnerability affects all versions of the specified models, with no patches currently available. The exposure of administrative credentials can lead to full device compromise, enabling attackers to manipulate router configurations, intercept or redirect traffic, and pivot into internal networks. The flaw's exploitation requires only network access to the device's management interface, making it highly dangerous in poorly segmented or exposed environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and data confidentiality. Compromise of administrative credentials on Ruijie NBR routers can lead to unauthorized configuration changes, interception of sensitive communications, and lateral movement within corporate or critical infrastructure networks. Given that these routers are often deployed in enterprise, government, and industrial environments, exploitation could disrupt operations, leak confidential information, and facilitate further attacks such as ransomware or espionage. The lack of authentication requirement and plaintext credential disclosure increase the likelihood of successful exploitation, especially in environments where these devices are accessible from less secure network segments or exposed to the internet. The impact extends beyond individual organizations to national critical infrastructure sectors relying on these devices for secure communications. Additionally, the absence of available patches increases the window of exposure, necessitating immediate compensating controls.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of Ruijie NBR routers, ensuring they are not accessible from untrusted networks or the internet. 2. Implement strict network segmentation and firewall rules to isolate router management traffic to trusted administrative hosts only. 3. Monitor network traffic for unusual POST requests targeting the /WEB_VMS/LEVEL15/ endpoint, especially those with suspicious Cookie header modifications. 4. Enforce strong authentication and access control policies on all network devices, and consider multi-factor authentication where supported. 5. Regularly audit router configurations and logs for signs of unauthorized access or credential leakage. 6. Engage with Ruijie support channels to obtain security advisories and patches as soon as they become available, and plan for rapid deployment. 7. Consider temporary replacement or additional security layers such as VPNs or jump hosts for router management until patches are applied. 8. Educate network administrators about this vulnerability and the importance of safeguarding router credentials and management interfaces.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-34057: CWE-306 Missing Authentication for Critical Function in Ruijie NBR Router
Description
An information disclosure vulnerability exists in Ruijie NBR series routers (known to affect NBR2000G, NBR1300G, and NBR1000 models) via the /WEB_VMS/LEVEL15/ endpoint. By crafting a specific POST request with modified Cookie headers and specially formatted parameters, an unauthenticated attacker can retrieve administrative account credentials in plaintext. This flaw allows direct disclosure of sensitive user data due to improper authentication checks and insecure backend logic. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
AI-Powered Analysis
Technical Analysis
CVE-2025-34057 is a critical information disclosure vulnerability in Ruijie NBR series routers (models NBR2000G, NBR1300G, and NBR1000). The vulnerability stems from missing authentication on the /WEB_VMS/LEVEL15/ endpoint, which allows unauthenticated attackers to craft specific POST requests with manipulated Cookie headers and specially formatted parameters. This flaw enables attackers to retrieve administrative account credentials in plaintext, bypassing any authentication mechanisms due to improper backend logic and lack of access control. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), indicating a fundamental security design failure. The CVSS 4.0 base score is 8.7, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. The Shadowserver Foundation observed exploitation attempts on 2025-02-05, confirming active targeting. The vulnerability affects all versions of the specified models, with no patches currently available. The exposure of administrative credentials can lead to full device compromise, enabling attackers to manipulate router configurations, intercept or redirect traffic, and pivot into internal networks. The flaw's exploitation requires only network access to the device's management interface, making it highly dangerous in poorly segmented or exposed environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and data confidentiality. Compromise of administrative credentials on Ruijie NBR routers can lead to unauthorized configuration changes, interception of sensitive communications, and lateral movement within corporate or critical infrastructure networks. Given that these routers are often deployed in enterprise, government, and industrial environments, exploitation could disrupt operations, leak confidential information, and facilitate further attacks such as ransomware or espionage. The lack of authentication requirement and plaintext credential disclosure increase the likelihood of successful exploitation, especially in environments where these devices are accessible from less secure network segments or exposed to the internet. The impact extends beyond individual organizations to national critical infrastructure sectors relying on these devices for secure communications. Additionally, the absence of available patches increases the window of exposure, necessitating immediate compensating controls.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of Ruijie NBR routers, ensuring they are not accessible from untrusted networks or the internet. 2. Implement strict network segmentation and firewall rules to isolate router management traffic to trusted administrative hosts only. 3. Monitor network traffic for unusual POST requests targeting the /WEB_VMS/LEVEL15/ endpoint, especially those with suspicious Cookie header modifications. 4. Enforce strong authentication and access control policies on all network devices, and consider multi-factor authentication where supported. 5. Regularly audit router configurations and logs for signs of unauthorized access or credential leakage. 6. Engage with Ruijie support channels to obtain security advisories and patches as soon as they become available, and plan for rapid deployment. 7. Consider temporary replacement or additional security layers such as VPNs or jump hosts for router management until patches are applied. 8. Educate network administrators about this vulnerability and the importance of safeguarding router credentials and management interfaces.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.549Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68653a166f40f0eb7292c943
Added to database: 7/2/2025, 1:54:30 PM
Last enriched: 11/13/2025, 7:31:37 PM
Last updated: 12/12/2025, 9:27:27 PM
Views: 99
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-46289: An app may be able to access protected user data in Apple macOS
UnknownCVE-2025-46287: An attacker may be able to spoof their FaceTime caller ID in Apple macOS
UnknownCVE-2025-46285: An app may be able to gain root privileges in Apple macOS
UnknownCVE-2025-46276: An app may be able to access sensitive user data in Apple macOS
UnknownCVE-2025-43542: Password fields may be unintentionally revealed when remotely controlling a device over FaceTime in Apple macOS
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.