Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56097: n/a

0
Unknown
VulnerabilityCVE-2025-56097cvecve-2025-56097
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie RG-EW1800GX PRO B11P226_EW1800GX-PRO_10223117 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.

AI-Powered Analysis

AILast updated: 12/11/2025, 18:42:00 UTC

Technical Analysis

CVE-2025-56097 is a critical OS command injection vulnerability identified in the Ruijie RG-EW1800GX PRO router firmware, specifically within the Lua script located at /usr/local/lua/dev_config/config_retain.lua. The vulnerability arises from improper input validation in the module_set function, which processes POST requests. An attacker can craft a malicious POST request to this endpoint, injecting arbitrary OS commands that the device executes with elevated privileges. This flaw effectively allows remote code execution without requiring authentication or user interaction, making it highly exploitable. The Ruijie RG-EW1800GX PRO is a high-performance enterprise-grade wireless router commonly deployed in corporate and governmental networks. Exploitation could lead to full device compromise, enabling attackers to manipulate network traffic, exfiltrate sensitive data, or pivot to internal systems. Although no public exploits or patches have been released as of the publication date, the vulnerability's nature demands urgent attention. The absence of a CVSS score necessitates a severity assessment based on impact and exploitability factors. The vulnerability impacts confidentiality by exposing sensitive configuration and network data, integrity by allowing unauthorized command execution, and availability by potentially disrupting device operations. The scope includes all devices running the affected firmware version, with no authentication barrier. This vulnerability represents a significant risk to organizations relying on Ruijie networking equipment, especially those with exposed management interfaces.

Potential Impact

For European organizations, the impact of CVE-2025-56097 could be severe. Compromise of the Ruijie RG-EW1800GX PRO routers may lead to unauthorized access to internal networks, interception or manipulation of network traffic, and disruption of critical communication infrastructure. Enterprises and government agencies using these devices could face data breaches, espionage, or operational outages. The vulnerability's ability to execute arbitrary commands remotely without authentication increases the likelihood of widespread exploitation, especially in environments where device management interfaces are accessible from untrusted networks. Additionally, attackers could leverage compromised routers as footholds for lateral movement, escalating attacks within the organization's IT environment. The lack of available patches means organizations must rely on network-level controls and monitoring to mitigate risk. Given Ruijie's presence in European markets, particularly in sectors prioritizing cost-effective yet robust networking solutions, the threat is material. Failure to address this vulnerability promptly could result in significant financial, reputational, and regulatory consequences under EU data protection laws.

Mitigation Recommendations

1. Immediately restrict access to the management interfaces of Ruijie RG-EW1800GX PRO routers, ensuring they are not exposed to untrusted networks or the internet. 2. Implement network segmentation to isolate critical infrastructure and limit the impact of a compromised device. 3. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous POST requests targeting the module_set endpoint or unusual command execution patterns. 4. Monitor router logs for suspicious activity, including unexpected POST requests or command execution traces. 5. Engage with Ruijie support or authorized vendors to obtain firmware updates or patches as soon as they become available. 6. If patching is delayed, consider temporary device replacement or enhanced compensating controls such as VPN-only management access and multi-factor authentication for administrative interfaces. 7. Conduct regular security audits and penetration testing focusing on network devices to identify and remediate similar vulnerabilities proactively. 8. Educate IT staff on the specifics of this vulnerability to improve detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0c4c7d4c6f31f7befce0

Added to database: 12/11/2025, 6:24:12 PM

Last enriched: 12/11/2025, 6:42:00 PM

Last updated: 12/12/2025, 4:01:08 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats