Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56096: n/a

0
High
VulnerabilityCVE-2025-56096cvecve-2025-56096
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attackers to execute arbitrary commands via a crafted POST request to the restart_modules in file /usr/lib/lua/luci/controller/admin/common.lua.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:30:46 UTC

Technical Analysis

CVE-2025-56096 is an OS Command Injection vulnerability identified in the Ruijie RG-BCR RG-BCR600W device, specifically within the Lua controller script located at /usr/lib/lua/luci/controller/admin/common.lua. The vulnerability arises from insufficient input validation in the restart_modules functionality, which processes POST requests. An attacker with low privileges (PR:L) can craft a malicious POST request that injects arbitrary operating system commands, leading to remote code execution without requiring user interaction. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could allow attackers to fully control the device, manipulate data, disrupt services, or pivot into internal networks. Although no public exploits have been reported yet, the vulnerability is critical due to the device's role in network infrastructure. The Ruijie RG-BCR600W is commonly deployed in enterprise and service provider environments, making this a significant risk. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating a classic injection flaw. The lack of available patches at the time of disclosure necessitates immediate defensive measures to prevent exploitation.

Potential Impact

For European organizations, particularly those in telecommunications, enterprise networking, and critical infrastructure sectors, this vulnerability poses a severe risk. Exploitation could lead to unauthorized remote code execution, enabling attackers to disrupt network services, exfiltrate sensitive data, or establish persistent footholds within internal networks. Given the device’s role as a network controller, compromise could cascade to other connected systems, amplifying the impact. The high CVSS score indicates potential for widespread operational disruption and data breaches. Organizations relying on Ruijie RG-BCR600W devices may face downtime, regulatory penalties due to data loss or service interruptions, and reputational damage. The vulnerability's network attack vector and lack of user interaction requirement increase the likelihood of automated exploitation attempts once public exploits emerge.

Mitigation Recommendations

Until official patches are released by Ruijie, European organizations should implement strict network segmentation to isolate RG-BCR600W devices from untrusted networks and limit management interface access to trusted administrators only. Employ network intrusion detection systems (NIDS) to monitor and alert on suspicious POST requests targeting the restart_modules endpoint or unusual command execution patterns. Enforce strong authentication and privilege management to minimize the number of users with access to vulnerable functions. Disable or restrict the restart_modules functionality if feasible. Conduct regular firmware audits and subscribe to Ruijie security advisories to apply patches promptly upon release. Additionally, implement application-layer firewalls or web application firewalls (WAFs) capable of detecting and blocking command injection attempts. Maintain comprehensive logging and incident response plans tailored to network device compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0c4c7d4c6f31f7befcdb

Added to database: 12/11/2025, 6:24:12 PM

Last enriched: 12/19/2025, 5:30:46 AM

Last updated: 2/6/2026, 4:12:06 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats