Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56092: n/a

0
High
VulnerabilityCVE-2025-56092cvecve-2025-56092
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie X30 PRO V1 X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:29:34 UTC

Technical Analysis

CVE-2025-56092 is an OS Command Injection vulnerability identified in the Ruijie X30 PRO V1 router firmware, specifically in the module_get function within the /usr/local/lua/dev_sta/networkConnect.lua script. This vulnerability arises from improper sanitization of input in a POST request, allowing an attacker to inject and execute arbitrary operating system commands. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 base score is 8.8, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits have been reported in the wild and no patches are currently available, the vulnerability presents a significant risk due to the potential for complete device compromise. Attackers who gain limited privileges on the device can leverage this flaw to execute arbitrary commands, potentially leading to network disruption, data exfiltration, or pivoting to other internal systems. The affected product is a network router commonly used in enterprise and service provider environments, making this vulnerability particularly critical for organizations relying on Ruijie networking hardware.

Potential Impact

For European organizations, exploitation of this vulnerability could result in severe operational disruptions, data breaches, and loss of control over critical network infrastructure. Given the high impact on confidentiality, integrity, and availability, attackers could intercept or manipulate sensitive communications, disrupt network services, or use compromised routers as footholds for further attacks within corporate or governmental networks. This is especially concerning for sectors such as telecommunications, finance, energy, and public administration, where Ruijie devices may be deployed. The lack of available patches increases the risk window, and the requirement for some privilege level means that attackers may need initial access, but once achieved, the consequences are severe. The vulnerability could also undermine trust in network reliability and compliance with European data protection regulations if exploited.

Mitigation Recommendations

European organizations should immediately audit their network environments to identify any Ruijie X30 PRO V1 devices. Until patches are available, network segmentation should be enforced to isolate vulnerable devices from critical systems. Access controls must be tightened to restrict administrative or privileged access to these routers, including enforcing strong authentication mechanisms and monitoring for unusual POST requests targeting the module_get endpoint. Intrusion detection systems and web application firewalls should be configured to detect and block suspicious command injection patterns in HTTP POST requests. Regular firmware integrity checks and network traffic analysis can help identify exploitation attempts. Organizations should engage with Ruijie support for any available firmware updates or workarounds and prepare for rapid deployment once patches are released. Additionally, consider implementing compensating controls such as VPNs or encrypted tunnels to reduce exposure of management interfaces.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0c4c7d4c6f31f7befcc6

Added to database: 12/11/2025, 6:24:12 PM

Last enriched: 12/19/2025, 5:29:34 AM

Last updated: 2/7/2026, 3:08:49 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats