Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56084: n/a

0
High
VulnerabilityCVE-2025-56084cvecve-2025-56084
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie RG-EW1800GX PRO B11P226_EW1800GX-PRO_10223117 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:27:21 UTC

Technical Analysis

CVE-2025-56084 is an OS Command Injection vulnerability identified in the Ruijie RG-EW1800GX PRO router firmware version B11P226_EW1800GX-PRO_10223117. The flaw resides in the handling of POST requests to the module_set function within the Lua script located at /usr/local/lua/dev_sta/nbr_cwmp.lua. Specifically, the vulnerability arises because user-supplied input is not properly sanitized before being passed to system command execution functions, classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). An attacker with low privileges (PR:L) can remotely send a crafted POST request to this endpoint, resulting in arbitrary command execution on the underlying operating system. The attack vector is network-based (AV:N), requires no user interaction (UI:N), and the scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a critical risk for affected devices. The lack of available patches at the time of publication increases the urgency for mitigation. This vulnerability could allow attackers to take full control of the device, manipulate network traffic, exfiltrate sensitive data, or disrupt network services.

Potential Impact

For European organizations, exploitation of CVE-2025-56084 could lead to severe operational disruptions and data breaches. Compromised routers can serve as entry points for lateral movement within corporate networks, enabling attackers to bypass perimeter defenses. Confidentiality is at risk as attackers may intercept or redirect sensitive communications. Integrity can be undermined by injecting malicious configurations or firmware modifications. Availability may be impacted through denial-of-service conditions triggered by malicious commands. Critical infrastructure sectors such as telecommunications, finance, and government agencies relying on Ruijie networking equipment are particularly vulnerable. The potential for widespread disruption is heightened in environments where these routers are deployed at scale or in key network segments. Additionally, the lack of user interaction and low privilege requirements lower the barrier for attackers, increasing the likelihood of exploitation. European organizations must consider the threat in the context of increasing geopolitical tensions and targeted cyberattacks against network infrastructure.

Mitigation Recommendations

1. Monitor Ruijie’s official channels closely for security advisories and apply firmware updates or patches immediately upon release. 2. Until patches are available, restrict access to the router’s management interfaces by implementing network segmentation and firewall rules limiting POST requests to trusted IP addresses only. 3. Employ intrusion detection/prevention systems (IDS/IPS) to detect anomalous POST requests targeting /usr/local/lua/dev_sta/nbr_cwmp.lua or unusual command execution patterns. 4. Conduct regular audits of router configurations and logs to identify unauthorized changes or suspicious activities. 5. Disable or limit remote management features if not strictly necessary. 6. Use network-level authentication and encryption to reduce exposure of management interfaces. 7. Educate network administrators about the vulnerability and signs of exploitation. 8. Consider deploying network behavior analytics tools to detect lateral movement originating from compromised routers. 9. Develop incident response plans specifically addressing router compromise scenarios. 10. Collaborate with Ruijie support for guidance and potential workarounds until official patches are released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0c4e7d4c6f31f7befd1c

Added to database: 12/11/2025, 6:24:14 PM

Last enriched: 12/19/2025, 5:27:21 AM

Last updated: 2/4/2026, 12:52:58 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats