Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56093: n/a

0
Unknown
VulnerabilityCVE-2025-56093cvecve-2025-56093
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the setWisp in file /usr/lib/lua/luci/modules/wireless.lua.

AI-Powered Analysis

AILast updated: 12/11/2025, 18:42:58 UTC

Technical Analysis

CVE-2025-56093 is an OS command injection vulnerability identified in the Ruijie X30-PRO wireless device firmware, specifically in the setWisp function located in /usr/lib/lua/luci/modules/wireless.lua. The vulnerability arises from insufficient input validation of POST request parameters, enabling an attacker to inject and execute arbitrary operating system commands remotely. This type of vulnerability is particularly dangerous because it can lead to full system compromise, allowing attackers to execute malicious code with the privileges of the affected service, potentially leading to data theft, network pivoting, or device disruption. The vulnerability does not require prior authentication, increasing its exploitability. Although no public exploits are currently known, the nature of OS command injection vulnerabilities typically results in rapid weaponization once disclosed. The lack of a CVSS score indicates that the vulnerability is newly published and pending further assessment. The Ruijie X30-PRO is used in enterprise and possibly service provider wireless networks, making this vulnerability relevant for organizations relying on these devices for critical wireless connectivity.

Potential Impact

For European organizations, exploitation of CVE-2025-56093 could result in severe operational disruptions, data breaches, and unauthorized network access. Wireless infrastructure compromised via this vulnerability could allow attackers to intercept or manipulate network traffic, disrupt wireless services, or use the device as a foothold for lateral movement within corporate networks. Sectors such as telecommunications, government, finance, and critical infrastructure operators that deploy Ruijie X30-PRO devices are particularly at risk. The absence of authentication requirements means attackers can exploit the vulnerability remotely without credentials, increasing the attack surface. Additionally, the potential for arbitrary command execution threatens confidentiality, integrity, and availability of affected systems, which could lead to regulatory non-compliance and reputational damage under European data protection laws.

Mitigation Recommendations

1. Immediately restrict access to the management interfaces of Ruijie X30-PRO devices to trusted networks and IP addresses using network segmentation and firewall rules. 2. Monitor network traffic for unusual POST requests targeting the setWisp endpoint or suspicious command injection patterns. 3. Disable or limit remote management features if not required. 4. Engage with Ruijie Networks for official patches or firmware updates addressing CVE-2025-56093 and apply them promptly once available. 5. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting command injection attempts. 6. Conduct regular security audits and penetration testing focused on wireless infrastructure to identify similar vulnerabilities. 7. Educate network administrators about this vulnerability and enforce strict change management and access control policies for wireless device configurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0c4c7d4c6f31f7befccb

Added to database: 12/11/2025, 6:24:12 PM

Last enriched: 12/11/2025, 6:42:58 PM

Last updated: 12/12/2025, 4:01:24 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats