Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56089: n/a

0
Unknown
VulnerabilityCVE-2025-56089cvecve-2025-56089
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie M18 EW_3.0(1)B11P226_M18_10223116 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.

AI-Powered Analysis

AILast updated: 12/11/2025, 18:39:28 UTC

Technical Analysis

CVE-2025-56089 is a critical OS Command Injection vulnerability identified in the Ruijie M18 wireless access point firmware version EW_3.0(1)B11P226_M18_10223116. The vulnerability resides in the Lua script located at /usr/local/lua/dev_sta/nbr_cwmp.lua, specifically in the module_set function, which improperly sanitizes user input received via POST requests. An attacker can craft a malicious POST request targeting this endpoint to inject arbitrary operating system commands, which the device executes with elevated privileges. This flaw allows remote attackers to gain control over the device without requiring authentication or user interaction, making exploitation straightforward. The compromised device could be used to disrupt network operations, intercept or manipulate traffic, or serve as a foothold for further attacks within an organization's network. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a significant threat. The lack of a CVSS score indicates the vulnerability is newly published, and no official patches or mitigations have been released at the time of reporting. Ruijie M18 devices are commonly deployed in enterprise and service provider environments, increasing the potential impact on critical infrastructure and business operations.

Potential Impact

For European organizations, exploitation of CVE-2025-56089 could lead to severe consequences including unauthorized access to network devices, disruption of wireless network services, and potential compromise of sensitive data traversing these devices. Attackers gaining control over Ruijie M18 access points can manipulate network traffic, launch man-in-the-middle attacks, or pivot to internal systems, escalating the scope of the breach. Critical sectors such as telecommunications, finance, healthcare, and government agencies that rely on Ruijie networking equipment may experience operational downtime or data breaches. The vulnerability's remote exploitation capability without authentication increases the risk of widespread attacks, especially in environments with exposed management interfaces or insufficient network segmentation. Additionally, the lack of available patches at the time of disclosure may prolong exposure, necessitating interim protective measures. The impact extends beyond individual organizations to national infrastructure resilience, particularly where Ruijie devices are integral to network connectivity.

Mitigation Recommendations

1. Immediate action should focus on obtaining and applying official firmware updates from Ruijie once available to remediate the vulnerability. 2. Until patches are released, restrict access to the management interfaces of Ruijie M18 devices by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 3. Deploy intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect and block suspicious POST requests targeting the module_set endpoint or unusual command injection patterns. 4. Conduct thorough network audits to identify all Ruijie M18 devices and verify their firmware versions. 5. Disable or restrict remote management features if not essential, especially those accessible from the internet. 6. Monitor device logs for anomalous activities indicative of exploitation attempts. 7. Educate network administrators on the vulnerability specifics to enhance incident response readiness. 8. Consider deploying network behavior anomaly detection tools to identify lateral movement or unusual device behavior post-compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0c4e7d4c6f31f7befd35

Added to database: 12/11/2025, 6:24:14 PM

Last enriched: 12/11/2025, 6:39:28 PM

Last updated: 12/12/2025, 4:00:53 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats