Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56089: n/a

0
High
VulnerabilityCVE-2025-56089cvecve-2025-56089
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie M18 EW_3.0(1)B11P226_M18_10223116 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:28:42 UTC

Technical Analysis

CVE-2025-56089 is an OS command injection vulnerability identified in the Ruijie M18 network device firmware version EW_3.0(1)B11P226_M18_10223116. The flaw resides in the module_set functionality implemented in the Lua script located at /usr/local/lua/dev_sta/nbr_cwmp.lua. An attacker with network access and low privileges can send a crafted POST request to this endpoint, which fails to properly sanitize input, allowing arbitrary operating system commands to be executed with the privileges of the affected process. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that user-supplied input is directly passed to system commands without adequate validation or escaping. The CVSS v3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with its network attack vector and lack of required user interaction. While no public exploits have been reported yet, the nature of the vulnerability makes it a prime candidate for exploitation once weaponized. The affected Ruijie M18 devices are commonly deployed in enterprise and service provider networks, making this a critical concern for network security. The vulnerability allows attackers to potentially gain full control over the device, manipulate network traffic, disrupt services, or pivot to internal networks, posing a severe threat to organizational security.

Potential Impact

For European organizations, exploitation of CVE-2025-56089 could lead to complete compromise of affected Ruijie M18 devices, which are often used as network routers or access points. This could result in unauthorized access to sensitive data, interception or manipulation of network traffic, and disruption of critical network services. Given the high privileges typically associated with such devices, attackers could establish persistent footholds, launch further attacks within the internal network, or cause denial of service conditions. The impact is particularly severe for sectors relying heavily on network availability and integrity, such as finance, telecommunications, healthcare, and government. Additionally, compromised network infrastructure devices can undermine trust in organizational security postures and lead to regulatory non-compliance under GDPR and other European data protection laws. The absence of known public exploits currently provides a window for proactive defense, but the vulnerability’s characteristics suggest that exploitation could become widespread if not addressed promptly.

Mitigation Recommendations

1. Immediate network segmentation to isolate Ruijie M18 devices from untrusted networks and limit access to management interfaces. 2. Implement strict access control lists (ACLs) and firewall rules to restrict POST requests to the vulnerable module_set endpoint only to authorized management hosts. 3. Monitor network traffic for anomalous POST requests targeting /usr/local/lua/dev_sta/nbr_cwmp.lua or unusual command execution patterns on Ruijie devices. 4. Engage with Ruijie Networks support to obtain firmware updates or patches addressing this vulnerability; if unavailable, consider temporary device replacement or disabling vulnerable services. 5. Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts. 6. Enforce multi-factor authentication and strong credential policies for device management to reduce risk from compromised credentials. 7. Conduct regular security audits and vulnerability assessments on network infrastructure to identify and remediate similar risks. 8. Prepare incident response plans specifically for network device compromise scenarios to enable rapid containment and recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0c4e7d4c6f31f7befd35

Added to database: 12/11/2025, 6:24:14 PM

Last enriched: 12/19/2025, 5:28:42 AM

Last updated: 2/5/2026, 4:01:14 PM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats