CVE-2025-56087: n/a
OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attackers to execute arbitrary commands via a crafted POST request to the run_tcpdump in file /usr/lib/lua/luci/controller/admin/common_tcpdump.lua.
AI Analysis
Technical Summary
CVE-2025-56087 is an OS command injection vulnerability identified in the Ruijie RG-BCR RG-BCR600W network device. The flaw resides in the run_tcpdump function implemented in the Lua script located at /usr/lib/lua/luci/controller/admin/common_tcpdump.lua. An attacker with low privileges can send a crafted POST request that injects arbitrary OS commands, which the device executes with the privileges of the affected service. This vulnerability stems from improper input validation and sanitization of parameters passed to system-level commands, classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 base score is 8.8, reflecting network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently documented, the ease of exploitation and critical impact make this a significant threat. The vulnerability could allow attackers to gain full control over the device, manipulate network traffic, disrupt services, or pivot into internal networks. The absence of available patches at the time of publication increases the urgency for mitigations.
Potential Impact
For European organizations, exploitation of CVE-2025-56087 could lead to severe consequences including unauthorized command execution on critical network devices, resulting in data breaches, network disruption, and loss of service availability. Given the device’s role in network management and traffic monitoring, attackers could intercept or manipulate sensitive communications, degrade network performance, or establish persistent footholds for further attacks. Enterprises, government agencies, and critical infrastructure operators using Ruijie RG-BCR600W devices are particularly vulnerable. The compromise of such devices could facilitate lateral movement within networks, impacting confidentiality and integrity of data and potentially causing cascading failures in dependent systems. The high CVSS score underscores the potential for widespread operational impact and data compromise across affected European entities.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the device’s management interfaces to trusted networks only, employing network segmentation to isolate vulnerable devices, and monitoring network traffic for anomalous POST requests targeting the run_tcpdump endpoint. Administrators should implement strict input validation and filtering at network boundaries where possible. Until an official patch is released, consider disabling or restricting the affected functionality if feasible. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures tailored to detect exploitation attempts of this vulnerability. Regularly audit device configurations and logs for signs of compromise. Engage with Ruijie support channels to obtain updates on patch availability and apply them promptly once released. Additionally, conduct security awareness training for network administrators to recognize and respond to exploitation indicators.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-56087: n/a
Description
OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attackers to execute arbitrary commands via a crafted POST request to the run_tcpdump in file /usr/lib/lua/luci/controller/admin/common_tcpdump.lua.
AI-Powered Analysis
Technical Analysis
CVE-2025-56087 is an OS command injection vulnerability identified in the Ruijie RG-BCR RG-BCR600W network device. The flaw resides in the run_tcpdump function implemented in the Lua script located at /usr/lib/lua/luci/controller/admin/common_tcpdump.lua. An attacker with low privileges can send a crafted POST request that injects arbitrary OS commands, which the device executes with the privileges of the affected service. This vulnerability stems from improper input validation and sanitization of parameters passed to system-level commands, classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 base score is 8.8, reflecting network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently documented, the ease of exploitation and critical impact make this a significant threat. The vulnerability could allow attackers to gain full control over the device, manipulate network traffic, disrupt services, or pivot into internal networks. The absence of available patches at the time of publication increases the urgency for mitigations.
Potential Impact
For European organizations, exploitation of CVE-2025-56087 could lead to severe consequences including unauthorized command execution on critical network devices, resulting in data breaches, network disruption, and loss of service availability. Given the device’s role in network management and traffic monitoring, attackers could intercept or manipulate sensitive communications, degrade network performance, or establish persistent footholds for further attacks. Enterprises, government agencies, and critical infrastructure operators using Ruijie RG-BCR600W devices are particularly vulnerable. The compromise of such devices could facilitate lateral movement within networks, impacting confidentiality and integrity of data and potentially causing cascading failures in dependent systems. The high CVSS score underscores the potential for widespread operational impact and data compromise across affected European entities.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the device’s management interfaces to trusted networks only, employing network segmentation to isolate vulnerable devices, and monitoring network traffic for anomalous POST requests targeting the run_tcpdump endpoint. Administrators should implement strict input validation and filtering at network boundaries where possible. Until an official patch is released, consider disabling or restricting the affected functionality if feasible. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures tailored to detect exploitation attempts of this vulnerability. Regularly audit device configurations and logs for signs of compromise. Engage with Ruijie support channels to obtain updates on patch availability and apply them promptly once released. Additionally, conduct security awareness training for network administrators to recognize and respond to exploitation indicators.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693b0c4e7d4c6f31f7befd2b
Added to database: 12/11/2025, 6:24:14 PM
Last enriched: 12/19/2025, 5:28:04 AM
Last updated: 2/6/2026, 1:25:43 AM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumCVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
HighCVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighCVE-2026-24300: CWE-284: Improper Access Control in Microsoft Azure Front Door
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.