CVE-2025-56095: n/a
OS Command Injection vulnerability in Ruijie RG-EW1200G PRO RG-EW1200G PRO V1.00/V2.00/V3.00/V4.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.
AI Analysis
Technical Summary
CVE-2025-56095 is an OS command injection vulnerability identified in Ruijie RG-EW1200G PRO devices, spanning firmware versions V1.00 through V4.00. The vulnerability resides in the handling of POST requests to the module_set function within the /usr/local/lua/dev_sta/nbr_cwmp.lua script. Specifically, the device fails to properly sanitize input parameters, allowing an attacker with low privileges to inject arbitrary operating system commands. This flaw is exploitable remotely over the network without requiring user interaction, making it a critical risk for exposed devices. The CVSS 3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and unchanged scope (S:U). Although no public exploits have been reported yet, the vulnerability’s characteristics suggest that exploitation could lead to full device compromise, enabling attackers to execute arbitrary commands, potentially pivot within networks, exfiltrate sensitive data, or disrupt services. The vulnerability is categorized under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), a common and dangerous class of injection flaws. No patches or mitigation updates have been published at the time of disclosure, increasing the urgency for defensive measures. Ruijie RG-EW1200G PRO devices are commonly deployed in enterprise and service provider environments, making this vulnerability a significant concern for network security.
Potential Impact
For European organizations, the impact of CVE-2025-56095 is substantial. The affected Ruijie RG-EW1200G PRO devices are often used in enterprise networks and critical infrastructure, including telecommunications and managed service providers. Exploitation can lead to unauthorized command execution, resulting in data breaches, network disruption, and potential lateral movement within corporate environments. This could compromise sensitive customer data, intellectual property, and operational continuity. Given the high CVSS score and the ability to execute arbitrary commands remotely, attackers could deploy malware, create persistent backdoors, or disrupt network services. The lack of available patches increases the risk window, especially for organizations with exposed management interfaces. European entities with regulatory obligations under GDPR and NIS Directive face additional compliance risks if this vulnerability is exploited. The operational impact could extend to service outages and reputational damage, particularly in sectors such as finance, healthcare, and government where Ruijie devices may be deployed.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of Ruijie RG-EW1200G PRO devices, ensuring they are not exposed to untrusted networks or the internet. 2. Implement strict firewall rules and network segmentation to isolate these devices from critical network segments. 3. Monitor network traffic for anomalous POST requests targeting the module_set endpoint or unusual command execution patterns. 4. Enforce strong authentication and limit administrative privileges to reduce the risk of low-privilege exploitation. 5. Engage with Ruijie support channels to obtain official patches or firmware updates as soon as they become available and prioritize their deployment. 6. Conduct regular vulnerability scans and penetration tests focusing on these devices to detect potential exploitation attempts. 7. Maintain comprehensive logging and alerting on device management activities to enable rapid incident response. 8. Consider deploying intrusion prevention systems (IPS) with signatures targeting this specific vulnerability once available. 9. Educate network administrators about this vulnerability and the importance of secure device configuration. 10. As a temporary measure, if feasible, disable or restrict the vulnerable module_set functionality until a patch is applied.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-56095: n/a
Description
OS Command Injection vulnerability in Ruijie RG-EW1200G PRO RG-EW1200G PRO V1.00/V2.00/V3.00/V4.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.
AI-Powered Analysis
Technical Analysis
CVE-2025-56095 is an OS command injection vulnerability identified in Ruijie RG-EW1200G PRO devices, spanning firmware versions V1.00 through V4.00. The vulnerability resides in the handling of POST requests to the module_set function within the /usr/local/lua/dev_sta/nbr_cwmp.lua script. Specifically, the device fails to properly sanitize input parameters, allowing an attacker with low privileges to inject arbitrary operating system commands. This flaw is exploitable remotely over the network without requiring user interaction, making it a critical risk for exposed devices. The CVSS 3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and unchanged scope (S:U). Although no public exploits have been reported yet, the vulnerability’s characteristics suggest that exploitation could lead to full device compromise, enabling attackers to execute arbitrary commands, potentially pivot within networks, exfiltrate sensitive data, or disrupt services. The vulnerability is categorized under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), a common and dangerous class of injection flaws. No patches or mitigation updates have been published at the time of disclosure, increasing the urgency for defensive measures. Ruijie RG-EW1200G PRO devices are commonly deployed in enterprise and service provider environments, making this vulnerability a significant concern for network security.
Potential Impact
For European organizations, the impact of CVE-2025-56095 is substantial. The affected Ruijie RG-EW1200G PRO devices are often used in enterprise networks and critical infrastructure, including telecommunications and managed service providers. Exploitation can lead to unauthorized command execution, resulting in data breaches, network disruption, and potential lateral movement within corporate environments. This could compromise sensitive customer data, intellectual property, and operational continuity. Given the high CVSS score and the ability to execute arbitrary commands remotely, attackers could deploy malware, create persistent backdoors, or disrupt network services. The lack of available patches increases the risk window, especially for organizations with exposed management interfaces. European entities with regulatory obligations under GDPR and NIS Directive face additional compliance risks if this vulnerability is exploited. The operational impact could extend to service outages and reputational damage, particularly in sectors such as finance, healthcare, and government where Ruijie devices may be deployed.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of Ruijie RG-EW1200G PRO devices, ensuring they are not exposed to untrusted networks or the internet. 2. Implement strict firewall rules and network segmentation to isolate these devices from critical network segments. 3. Monitor network traffic for anomalous POST requests targeting the module_set endpoint or unusual command execution patterns. 4. Enforce strong authentication and limit administrative privileges to reduce the risk of low-privilege exploitation. 5. Engage with Ruijie support channels to obtain official patches or firmware updates as soon as they become available and prioritize their deployment. 6. Conduct regular vulnerability scans and penetration tests focusing on these devices to detect potential exploitation attempts. 7. Maintain comprehensive logging and alerting on device management activities to enable rapid incident response. 8. Consider deploying intrusion prevention systems (IPS) with signatures targeting this specific vulnerability once available. 9. Educate network administrators about this vulnerability and the importance of secure device configuration. 10. As a temporary measure, if feasible, disable or restrict the vulnerable module_set functionality until a patch is applied.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693b0c4c7d4c6f31f7befcd6
Added to database: 12/11/2025, 6:24:12 PM
Last enriched: 12/19/2025, 5:30:31 AM
Last updated: 2/4/2026, 7:42:06 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24447: Improper neutralization of formula elements in a CSV file in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-23704: Unrestricted upload of file with dangerous type in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-22875: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-21393: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-1756: CWE-434 Unrestricted Upload of File with Dangerous Type in seezee WP FOFT Loader
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.