Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56090: n/a

0
Unknown
VulnerabilityCVE-2025-56090cvecve-2025-56090
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie RG-EW1200G PRO RG-EW1200G PRO V1.00/V2.00/V3.00/V4.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.

AI-Powered Analysis

AILast updated: 12/11/2025, 18:39:15 UTC

Technical Analysis

CVE-2025-56090 is a critical OS Command Injection vulnerability identified in the Ruijie RG-EW1200G PRO series of network devices, spanning firmware versions V1.00 through V4.00. The flaw resides in the handling of POST requests to the module_set endpoint within the Lua script located at /usr/local/lua/dev_config/config_retain.lua. An attacker can craft a malicious POST request that injects arbitrary operating system commands, which the device executes with the privileges of the affected service. This type of vulnerability allows remote attackers to gain unauthorized control over the device, potentially leading to full system compromise. The vulnerability does not require authentication, making it exploitable by any remote actor with network access to the device’s management interface. No CVSS score has been assigned yet, and no patches or official mitigations have been published, increasing the urgency for defensive measures. Although no known exploits are currently in the wild, the simplicity of exploitation and the critical nature of the vulnerability make it a significant threat. The affected devices are typically used in enterprise and service provider environments, where compromise could disrupt network operations, leak sensitive data, or serve as a foothold for further attacks within an organization’s network.

Potential Impact

For European organizations, exploitation of CVE-2025-56090 could result in severe operational and security consequences. Attackers gaining arbitrary command execution on Ruijie RG-EW1200G PRO devices could disrupt network availability by disabling or reconfiguring critical network functions. Confidentiality could be compromised if attackers extract sensitive configuration data or intercept network traffic. Integrity risks include unauthorized changes to device settings or firmware, potentially enabling persistent backdoors or lateral movement within the network. Given the lack of authentication requirements, attackers could exploit this vulnerability remotely, increasing the attack surface. Organizations relying on these devices for critical infrastructure, such as telecommunications providers, government agencies, or large enterprises, could face significant downtime and data breaches. The absence of patches means that mitigation relies heavily on network-level controls and monitoring, which may not be uniformly implemented across all European entities, increasing exposure.

Mitigation Recommendations

1. Immediately restrict access to the management interfaces of Ruijie RG-EW1200G PRO devices to trusted internal networks only, using network segmentation and firewall rules. 2. Implement strict ingress filtering to block unauthorized POST requests to the module_set endpoint or any suspicious HTTP traffic targeting device management interfaces. 3. Deploy intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect and alert on anomalous POST requests or command injection patterns targeting the Lua script path. 4. Monitor device logs and network traffic for unusual activity indicative of exploitation attempts, such as unexpected command execution or configuration changes. 5. Coordinate with Ruijie Networks for official patches or firmware updates and apply them promptly once available. 6. Consider temporary device isolation or replacement if critical infrastructure depends on these devices and no immediate patch is available. 7. Educate network administrators about this vulnerability and enforce strict operational security policies around device management. 8. Conduct regular vulnerability scans and penetration tests focusing on network device security to identify and remediate similar risks proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0c4e7d4c6f31f7befd3a

Added to database: 12/11/2025, 6:24:14 PM

Last enriched: 12/11/2025, 6:39:15 PM

Last updated: 12/12/2025, 4:00:53 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats