Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56102: n/a

0
High
VulnerabilityCVE-2025-56102cvecve-2025-56102
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie RG-EW1800GX B11P226_EW1800GX_10223121 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:32:27 UTC

Technical Analysis

CVE-2025-56102 is an OS Command Injection vulnerability identified in the Ruijie RG-EW1800GX router firmware version B11P226_EW1800GX_10223121. The flaw exists in the Lua script located at /usr/local/lua/dev_sta/networkConnect.lua, specifically in the module_get function, which processes POST requests. An attacker with low privileges (PR:L) can send a specially crafted POST request that injects arbitrary operating system commands due to insufficient input validation and sanitization. This vulnerability falls under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), allowing remote code execution with no user interaction required (UI:N). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability (all rated high). The attack vector is network-based (AV:N), meaning exploitation can occur remotely over the network. Although no public exploits are currently reported, the vulnerability's nature and ease of exploitation make it a critical concern. The lack of available patches at the time of publication necessitates immediate defensive measures. This vulnerability could allow attackers to take full control of affected devices, potentially pivoting into internal networks or disrupting network operations.

Potential Impact

For European organizations, the impact of CVE-2025-56102 is significant. Compromise of Ruijie RG-EW1800GX routers could lead to unauthorized access to internal networks, data exfiltration, disruption of network services, and potential lateral movement to other critical systems. Given the router's role in network connectivity, exploitation could result in widespread denial of service or persistent backdoors. Organizations in sectors such as telecommunications, government, finance, and critical infrastructure that deploy these devices are at heightened risk. The vulnerability undermines device integrity and confidentiality, threatening sensitive data and operational continuity. Additionally, the ability to execute arbitrary commands remotely without user interaction increases the likelihood of automated exploitation attempts once public proof-of-concept code or exploits emerge. This could lead to large-scale attacks affecting multiple European entities simultaneously.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interfaces, especially from untrusted networks, using firewall rules or network segmentation. 2. Monitor network traffic for unusual POST requests targeting the /usr/local/lua/dev_sta/networkConnect.lua module_get endpoint, employing intrusion detection systems with custom signatures. 3. Apply any available firmware updates or patches from Ruijie as soon as they are released. 4. If patches are not yet available, consider temporary device replacement or disabling vulnerable services where feasible. 5. Implement strict input validation and command filtering at network gateways to detect and block injection attempts. 6. Conduct thorough audits of devices for signs of compromise, including unexpected processes or network connections. 7. Educate network administrators on the vulnerability and encourage rapid incident response readiness. 8. Employ network anomaly detection tools to identify suspicious command execution patterns. 9. Collaborate with Ruijie support and security advisories to stay informed of developments and mitigation guidance. 10. Consider deploying network segmentation to isolate vulnerable devices from critical assets to limit potential damage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0fc17d4c6f31f7bf9f1f

Added to database: 12/11/2025, 6:38:57 PM

Last enriched: 12/19/2025, 5:32:27 AM

Last updated: 2/7/2026, 4:46:31 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats