Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56093: n/a

0
High
VulnerabilityCVE-2025-56093cvecve-2025-56093
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the setWisp in file /usr/lib/lua/luci/modules/wireless.lua.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:29:54 UTC

Technical Analysis

CVE-2025-56093 is an OS Command Injection vulnerability identified in the Ruijie X30-PRO router firmware version X30-PRO-V1_09241521. The flaw exists in the setWisp function located in the Lua script /usr/lib/lua/luci/modules/wireless.lua, which handles wireless configuration via HTTP POST requests. An attacker with low privileges (PR:L) can craft a malicious POST request that injects arbitrary operating system commands, which the device executes with the privileges of the affected service. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The impact is severe, affecting confidentiality, integrity, and availability (C:H/I:H/A:H), potentially allowing full system compromise, data exfiltration, or denial of service. Although no public exploits are known yet, the vulnerability is critical due to the nature of the device as a network infrastructure component. The weakness is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating insufficient input validation or sanitization in the affected code. The vulnerability was reserved in August 2025 and published in December 2025, with no patches currently available, increasing the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a significant threat to network infrastructure security. Ruijie X30-PRO routers are often deployed in enterprise, government, and critical infrastructure environments, where compromise could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. The ability to execute arbitrary commands remotely can allow attackers to install persistent backdoors, pivot within networks, or launch further attacks. This can result in data breaches, operational downtime, and damage to organizational reputation. Given the high CVSS score and the critical role of routers in network security, the impact on confidentiality, integrity, and availability is substantial. Organizations lacking timely patches or mitigations may face increased risk of targeted attacks or automated exploitation once public exploits emerge.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting management interface access to trusted IP addresses and networks only, using firewall rules and VPNs. 2) Disabling or restricting the vulnerable setWisp functionality if possible, or disabling remote management features temporarily. 3) Monitoring network traffic for unusual POST requests targeting /usr/lib/lua/luci/modules/wireless.lua or the setWisp endpoint, using IDS/IPS solutions. 4) Applying strict input validation and filtering at network boundaries to detect and block command injection attempts. 5) Segmenting the network to isolate vulnerable devices from critical assets. 6) Preparing for rapid deployment of vendor patches once released and maintaining up-to-date inventories of affected devices. 7) Conducting regular security audits and penetration tests focusing on router configurations and firmware versions. These steps will reduce the attack surface and limit potential exploitation until a vendor patch is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0c4c7d4c6f31f7befccb

Added to database: 12/11/2025, 6:24:12 PM

Last enriched: 12/19/2025, 5:29:54 AM

Last updated: 2/7/2026, 2:54:56 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats