CVE-2025-56077: n/a
OS Command Injection vulnerability in Ruijie RG-RAP2200(E) 247 2200 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.
AI Analysis
Technical Summary
CVE-2025-56077 is an OS Command Injection vulnerability identified in the Ruijie RG-RAP2200(E) 247 2200 series network devices. The flaw exists in the module_set function implemented in the Lua script located at /usr/local/lua/dev_sta/nbr_cwmp.lua. An attacker with low privileges can craft a malicious POST request targeting this module, injecting arbitrary operating system commands that the device executes with the privileges of the affected process. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that user-supplied input is not properly sanitized before being passed to system-level command execution functions. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. The vulnerability scope is unchanged, meaning the impact is confined to the vulnerable component but can lead to full device compromise. Although no public exploits have been reported, the severity and ease of exploitation make this a critical concern for affected users. The absence of published patches necessitates immediate defensive measures to prevent exploitation. Given the device's role in network access and management, exploitation could allow attackers to disrupt network operations, exfiltrate sensitive data, or pivot deeper into organizational networks.
Potential Impact
For European organizations, exploitation of CVE-2025-56077 could lead to severe operational disruptions, data breaches, and loss of control over critical network infrastructure. The Ruijie RG-RAP2200(E) 247 2200 devices are typically deployed in enterprise and service provider environments for wireless access and network management. A successful attack could enable adversaries to execute arbitrary commands, potentially installing malware, intercepting or manipulating network traffic, or causing denial of service. This threatens the confidentiality of sensitive communications, the integrity of network configurations, and the availability of network services. Organizations in sectors such as telecommunications, finance, government, and critical infrastructure that rely on these devices are particularly vulnerable. The ability to exploit remotely without user interaction increases the risk of widespread automated attacks. The lack of patches further exacerbates the threat, requiring organizations to implement compensating controls to mitigate risk until a fix is available.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of Ruijie RG-RAP2200(E) 247 2200 devices, limiting exposure to trusted administrators only via VPN or secure management networks. 2. Implement strict firewall rules to block unauthorized POST requests targeting the vulnerable module_set endpoint. 3. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect and block suspicious command injection attempts in HTTP POST traffic. 4. Conduct thorough logging and monitoring of device management traffic to identify anomalous requests or command executions. 5. Enforce strong authentication and role-based access controls to minimize the privileges of users interacting with the device. 6. Engage with Ruijie Networks for timely updates and patches; apply security updates immediately upon release. 7. Consider network segmentation to isolate vulnerable devices from critical assets. 8. Perform regular vulnerability scans and penetration tests focusing on network devices to detect exploitation attempts. 9. Educate network administrators about the vulnerability and signs of compromise to enhance incident response readiness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-56077: n/a
Description
OS Command Injection vulnerability in Ruijie RG-RAP2200(E) 247 2200 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.
AI-Powered Analysis
Technical Analysis
CVE-2025-56077 is an OS Command Injection vulnerability identified in the Ruijie RG-RAP2200(E) 247 2200 series network devices. The flaw exists in the module_set function implemented in the Lua script located at /usr/local/lua/dev_sta/nbr_cwmp.lua. An attacker with low privileges can craft a malicious POST request targeting this module, injecting arbitrary operating system commands that the device executes with the privileges of the affected process. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that user-supplied input is not properly sanitized before being passed to system-level command execution functions. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. The vulnerability scope is unchanged, meaning the impact is confined to the vulnerable component but can lead to full device compromise. Although no public exploits have been reported, the severity and ease of exploitation make this a critical concern for affected users. The absence of published patches necessitates immediate defensive measures to prevent exploitation. Given the device's role in network access and management, exploitation could allow attackers to disrupt network operations, exfiltrate sensitive data, or pivot deeper into organizational networks.
Potential Impact
For European organizations, exploitation of CVE-2025-56077 could lead to severe operational disruptions, data breaches, and loss of control over critical network infrastructure. The Ruijie RG-RAP2200(E) 247 2200 devices are typically deployed in enterprise and service provider environments for wireless access and network management. A successful attack could enable adversaries to execute arbitrary commands, potentially installing malware, intercepting or manipulating network traffic, or causing denial of service. This threatens the confidentiality of sensitive communications, the integrity of network configurations, and the availability of network services. Organizations in sectors such as telecommunications, finance, government, and critical infrastructure that rely on these devices are particularly vulnerable. The ability to exploit remotely without user interaction increases the risk of widespread automated attacks. The lack of patches further exacerbates the threat, requiring organizations to implement compensating controls to mitigate risk until a fix is available.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of Ruijie RG-RAP2200(E) 247 2200 devices, limiting exposure to trusted administrators only via VPN or secure management networks. 2. Implement strict firewall rules to block unauthorized POST requests targeting the vulnerable module_set endpoint. 3. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect and block suspicious command injection attempts in HTTP POST traffic. 4. Conduct thorough logging and monitoring of device management traffic to identify anomalous requests or command executions. 5. Enforce strong authentication and role-based access controls to minimize the privileges of users interacting with the device. 6. Engage with Ruijie Networks for timely updates and patches; apply security updates immediately upon release. 7. Consider network segmentation to isolate vulnerable devices from critical assets. 8. Perform regular vulnerability scans and penetration tests focusing on network devices to detect exploitation attempts. 9. Educate network administrators about the vulnerability and signs of compromise to enhance incident response readiness.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693b0c4c7d4c6f31f7befcea
Added to database: 12/11/2025, 6:24:12 PM
Last enriched: 12/19/2025, 5:26:21 AM
Last updated: 2/7/2026, 12:41:33 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.