Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56094: n/a

0
Unknown
VulnerabilityCVE-2025-56094cvecve-2025-56094
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/host_access_delay.lua.

AI-Powered Analysis

AILast updated: 12/11/2025, 18:42:46 UTC

Technical Analysis

CVE-2025-56094 is an OS Command Injection vulnerability identified in the Ruijie X30-PRO router series, specifically in the module_get function implemented in the Lua script located at /usr/local/lua/dev_sta/host_access_delay.lua. This vulnerability allows an unauthenticated attacker to send specially crafted POST requests to the device, which are improperly sanitized, enabling arbitrary command execution on the underlying operating system. The attack vector leverages the device's web management interface or any exposed service that processes these POST requests. Because the flaw resides in a Lua script handling host access delay parameters, the attacker can inject shell commands that the system executes with the privileges of the web service or root user, depending on the device configuration. This can lead to full device compromise, including the ability to alter configurations, intercept or redirect network traffic, deploy persistent malware, or pivot to internal networks. No CVSS score has been assigned yet, and no patches or public exploits are currently available, indicating the vulnerability is newly disclosed. The absence of authentication requirements and the direct command injection nature make this a highly critical security issue. Organizations using Ruijie X30-PRO devices should consider this a severe threat and prepare for immediate mitigation and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-56094 can be severe. Compromise of Ruijie X30-PRO routers could lead to unauthorized access to internal networks, data interception, and disruption of network services. This is particularly critical for sectors relying on these devices for secure communications, such as government agencies, telecommunications providers, and critical infrastructure operators. Attackers could use the vulnerability to establish persistent footholds, exfiltrate sensitive data, or launch further attacks within the network. The potential for widespread disruption is heightened if these devices are deployed in large numbers or in key network segments. Additionally, the lack of available patches increases the window of exposure, forcing organizations to rely on compensating controls. The vulnerability could also undermine compliance with European data protection regulations if exploited to access personal or sensitive data.

Mitigation Recommendations

1. Immediately isolate Ruijie X30-PRO devices from untrusted networks and restrict management interface access to trusted administrators only. 2. Implement strict network segmentation to limit the exposure of vulnerable devices to potential attackers. 3. Deploy intrusion detection and prevention systems (IDS/IPS) with custom signatures to detect anomalous POST requests targeting the module_get endpoint. 4. Monitor device logs and network traffic for unusual command execution patterns or unexpected outbound connections. 5. Engage with Ruijie Networks for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 6. If patching is delayed, consider temporary mitigations such as disabling the vulnerable Lua module or restricting POST request handling via firewall rules. 7. Conduct thorough security audits of all network devices to identify other potential vulnerabilities and ensure up-to-date configurations. 8. Educate network administrators about this vulnerability and enforce strict access controls and authentication mechanisms for device management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0c4c7d4c6f31f7befcd1

Added to database: 12/11/2025, 6:24:12 PM

Last enriched: 12/11/2025, 6:42:46 PM

Last updated: 12/12/2025, 4:01:10 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats