Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56079: n/a

0
High
VulnerabilityCVE-2025-56079cvecve-2025-56079
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie RG-EW1300G EW1300G V1.00/V2.00/V4.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:26:43 UTC

Technical Analysis

CVE-2025-56079 is an OS command injection vulnerability identified in the Ruijie RG-EW1300G wireless router models running firmware versions V1.00, V2.00, and V4.00. The vulnerability resides in the module_get function within the /usr/local/lua/dev_sta/networkConnect.lua file, where insufficient input validation allows an attacker to inject arbitrary OS commands. An attacker with low-level privileges can craft a malicious POST request targeting this function to execute commands on the underlying operating system. This flaw is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that user-supplied input is not properly sanitized before being passed to system calls. The CVSS v3.1 base score is 8.8, reflecting high severity due to network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits or patches are currently available, the vulnerability poses a serious threat to affected devices, potentially allowing attackers to gain full control over the router, intercept or manipulate network traffic, and disrupt network operations. The vulnerability's presence in a network device firmware used in enterprise and possibly critical infrastructure environments elevates its risk profile.

Potential Impact

For European organizations, the impact of CVE-2025-56079 can be severe. Compromise of Ruijie RG-EW1300G routers could lead to unauthorized access to internal networks, interception of sensitive data, and disruption of network services. This is particularly critical for sectors such as telecommunications, government, finance, and energy, where network reliability and data confidentiality are paramount. Attackers exploiting this vulnerability could pivot from the compromised router to other internal systems, leading to broader network breaches. The high integrity and availability impact means attackers could alter configurations or cause denial of service, affecting business continuity. Given the requirement for low-level privileges, insider threats or attackers who have obtained limited credentials could exploit this flaw. The absence of patches increases the window of exposure, necessitating immediate compensating controls to protect European entities relying on these devices.

Mitigation Recommendations

1. Immediately restrict access to the management interfaces of Ruijie RG-EW1300G devices to trusted networks and administrators only, using network segmentation and firewall rules. 2. Implement strict authentication and authorization policies to limit privilege escalation opportunities. 3. Monitor network traffic for unusual POST requests targeting the /usr/local/lua/dev_sta/networkConnect.lua module_get endpoint, employing intrusion detection systems with custom signatures. 4. Disable or restrict remote management features if not essential. 5. Regularly audit device configurations and logs for signs of exploitation attempts. 6. Engage with Ruijie support channels to obtain and apply firmware updates or patches as soon as they become available. 7. Consider deploying network-level protections such as web application firewalls (WAFs) or reverse proxies to filter malicious payloads. 8. Educate network administrators about the vulnerability and encourage prompt reporting of anomalies. 9. For critical environments, evaluate replacing affected devices with alternatives that have no known vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0c4c7d4c6f31f7befcef

Added to database: 12/11/2025, 6:24:12 PM

Last enriched: 12/19/2025, 5:26:43 AM

Last updated: 2/5/2026, 9:12:09 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats