CVE-2025-56090: n/a
OS Command Injection vulnerability in Ruijie RG-EW1200G PRO RG-EW1200G PRO V1.00/V2.00/V3.00/V4.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.
AI Analysis
Technical Summary
CVE-2025-56090 is an OS command injection vulnerability identified in Ruijie RG-EW1200G PRO wireless access points running firmware versions V1.00 through V4.00. The flaw resides in the /usr/local/lua/dev_config/config_retain.lua file, specifically in the module_set functionality that processes POST requests. An attacker with low-level privileges can craft a malicious POST request that injects arbitrary operating system commands, which the device executes with the privileges of the affected service. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that input validation is insufficient or absent, allowing command injection. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. Although no public exploits have been reported, the vulnerability's characteristics suggest it could be weaponized to gain full control over the device, disrupt network services, or pivot into internal networks. The vulnerability affects multiple firmware versions, indicating a broad attack surface. The absence of published patches at the time of disclosure necessitates immediate compensating controls.
Potential Impact
For European organizations, the exploitation of CVE-2025-56090 could lead to severe consequences including unauthorized access to network infrastructure, data breaches, and disruption of critical network services. Compromise of Ruijie RG-EW1200G PRO devices could allow attackers to intercept or manipulate network traffic, deploy malware, or establish persistent footholds within enterprise environments. This is particularly concerning for sectors such as telecommunications, government, finance, and critical infrastructure operators that rely on these devices for secure wireless connectivity. The high severity and ease of exploitation mean that attackers could rapidly compromise vulnerable devices remotely, potentially leading to widespread operational disruptions and data loss. The lack of known exploits currently provides a limited window for proactive defense, but also indicates the need for urgent patching and monitoring to prevent future attacks.
Mitigation Recommendations
1. Immediately restrict access to the management interfaces of Ruijie RG-EW1200G PRO devices to trusted IP addresses and networks, ideally isolating them from the public internet. 2. Implement network segmentation to limit the exposure of vulnerable devices and reduce lateral movement opportunities. 3. Monitor network traffic for unusual POST requests targeting the /usr/local/lua/dev_config/config_retain.lua module_set endpoint, using IDS/IPS or custom detection rules. 4. Apply vendor-supplied patches or firmware updates as soon as they become available; in the absence of patches, consider temporary device replacement or removal from critical network segments. 5. Enforce strict input validation and command execution policies on affected devices if configurable. 6. Conduct regular vulnerability scans and penetration tests focusing on Ruijie devices to identify potential exploitation attempts. 7. Educate network administrators about this vulnerability and the importance of monitoring and access controls. 8. Maintain up-to-date asset inventories to quickly identify and remediate affected devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-56090: n/a
Description
OS Command Injection vulnerability in Ruijie RG-EW1200G PRO RG-EW1200G PRO V1.00/V2.00/V3.00/V4.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.
AI-Powered Analysis
Technical Analysis
CVE-2025-56090 is an OS command injection vulnerability identified in Ruijie RG-EW1200G PRO wireless access points running firmware versions V1.00 through V4.00. The flaw resides in the /usr/local/lua/dev_config/config_retain.lua file, specifically in the module_set functionality that processes POST requests. An attacker with low-level privileges can craft a malicious POST request that injects arbitrary operating system commands, which the device executes with the privileges of the affected service. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that input validation is insufficient or absent, allowing command injection. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. Although no public exploits have been reported, the vulnerability's characteristics suggest it could be weaponized to gain full control over the device, disrupt network services, or pivot into internal networks. The vulnerability affects multiple firmware versions, indicating a broad attack surface. The absence of published patches at the time of disclosure necessitates immediate compensating controls.
Potential Impact
For European organizations, the exploitation of CVE-2025-56090 could lead to severe consequences including unauthorized access to network infrastructure, data breaches, and disruption of critical network services. Compromise of Ruijie RG-EW1200G PRO devices could allow attackers to intercept or manipulate network traffic, deploy malware, or establish persistent footholds within enterprise environments. This is particularly concerning for sectors such as telecommunications, government, finance, and critical infrastructure operators that rely on these devices for secure wireless connectivity. The high severity and ease of exploitation mean that attackers could rapidly compromise vulnerable devices remotely, potentially leading to widespread operational disruptions and data loss. The lack of known exploits currently provides a limited window for proactive defense, but also indicates the need for urgent patching and monitoring to prevent future attacks.
Mitigation Recommendations
1. Immediately restrict access to the management interfaces of Ruijie RG-EW1200G PRO devices to trusted IP addresses and networks, ideally isolating them from the public internet. 2. Implement network segmentation to limit the exposure of vulnerable devices and reduce lateral movement opportunities. 3. Monitor network traffic for unusual POST requests targeting the /usr/local/lua/dev_config/config_retain.lua module_set endpoint, using IDS/IPS or custom detection rules. 4. Apply vendor-supplied patches or firmware updates as soon as they become available; in the absence of patches, consider temporary device replacement or removal from critical network segments. 5. Enforce strict input validation and command execution policies on affected devices if configurable. 6. Conduct regular vulnerability scans and penetration tests focusing on Ruijie devices to identify potential exploitation attempts. 7. Educate network administrators about this vulnerability and the importance of monitoring and access controls. 8. Maintain up-to-date asset inventories to quickly identify and remediate affected devices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693b0c4e7d4c6f31f7befd3a
Added to database: 12/11/2025, 6:24:14 PM
Last enriched: 12/19/2025, 5:28:56 AM
Last updated: 2/7/2026, 12:10:50 AM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.