CVE-2025-56110: n/a
OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers to execute arbitrary commands via a crafted POST request to the action_deal_update in file /usr/lib/lua/luci/controller/api/rcmsAPI.lua.
AI Analysis
Technical Summary
CVE-2025-56110 is an OS command injection vulnerability identified in the Ruijie RG-BCR RG-BCR860 network device. The flaw exists in the Lua script handling the action_deal_update function within the rcmsAPI.lua controller file. Specifically, the vulnerability arises because user-supplied input in a crafted POST request is not properly sanitized or validated before being passed to system-level command execution functions. This allows an attacker with low privileges (PR:L) to inject arbitrary OS commands remotely over the network (AV:N) without requiring user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the device, potentially allowing full system compromise, data exfiltration, or denial of service. The vulnerability is rated with a CVSS 3.1 score of 8.8, reflecting its high severity and ease of exploitation. Although no public exploits have been reported yet, the presence of this vulnerability in network infrastructure devices poses a significant risk, especially in environments where these devices are exposed or insufficiently protected. The CWE-78 classification confirms this is a classic OS command injection issue, which is a critical security flaw in web-facing applications or APIs. The lack of available patches at the time of publication necessitates immediate mitigation efforts by affected organizations.
Potential Impact
For European organizations, exploitation of CVE-2025-56110 could lead to severe consequences including unauthorized control over network devices, interception or manipulation of network traffic, disruption of critical services, and potential lateral movement within internal networks. Given that Ruijie RG-BCR860 devices are used in enterprise and possibly governmental networks, attackers could leverage this vulnerability to compromise sensitive data or disrupt operations. The high severity and network-exploitable nature mean that attackers can remotely execute commands without user interaction, increasing the risk of automated or targeted attacks. This could impact sectors such as telecommunications, finance, public administration, and critical infrastructure providers across Europe. The compromise of network devices also undermines trust in network security and can facilitate further attacks on connected systems.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of Ruijie RG-BCR860 devices, limiting exposure to trusted IP addresses only. 2. Implement strict firewall rules and network segmentation to isolate these devices from untrusted networks, including the internet. 3. Monitor network traffic for unusual POST requests targeting the /usr/lib/lua/luci/controller/api/rcmsAPI.lua endpoint, especially those invoking action_deal_update. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect command injection attempts. 5. Regularly audit device configurations and logs for signs of compromise or suspicious activity. 6. Engage with Ruijie Networks for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 7. Consider deploying application-layer gateways or web application firewalls (WAFs) capable of filtering malicious payloads targeting the vulnerable API. 8. Educate network administrators about the risks and signs of exploitation to enhance incident response readiness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-56110: n/a
Description
OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers to execute arbitrary commands via a crafted POST request to the action_deal_update in file /usr/lib/lua/luci/controller/api/rcmsAPI.lua.
AI-Powered Analysis
Technical Analysis
CVE-2025-56110 is an OS command injection vulnerability identified in the Ruijie RG-BCR RG-BCR860 network device. The flaw exists in the Lua script handling the action_deal_update function within the rcmsAPI.lua controller file. Specifically, the vulnerability arises because user-supplied input in a crafted POST request is not properly sanitized or validated before being passed to system-level command execution functions. This allows an attacker with low privileges (PR:L) to inject arbitrary OS commands remotely over the network (AV:N) without requiring user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the device, potentially allowing full system compromise, data exfiltration, or denial of service. The vulnerability is rated with a CVSS 3.1 score of 8.8, reflecting its high severity and ease of exploitation. Although no public exploits have been reported yet, the presence of this vulnerability in network infrastructure devices poses a significant risk, especially in environments where these devices are exposed or insufficiently protected. The CWE-78 classification confirms this is a classic OS command injection issue, which is a critical security flaw in web-facing applications or APIs. The lack of available patches at the time of publication necessitates immediate mitigation efforts by affected organizations.
Potential Impact
For European organizations, exploitation of CVE-2025-56110 could lead to severe consequences including unauthorized control over network devices, interception or manipulation of network traffic, disruption of critical services, and potential lateral movement within internal networks. Given that Ruijie RG-BCR860 devices are used in enterprise and possibly governmental networks, attackers could leverage this vulnerability to compromise sensitive data or disrupt operations. The high severity and network-exploitable nature mean that attackers can remotely execute commands without user interaction, increasing the risk of automated or targeted attacks. This could impact sectors such as telecommunications, finance, public administration, and critical infrastructure providers across Europe. The compromise of network devices also undermines trust in network security and can facilitate further attacks on connected systems.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of Ruijie RG-BCR860 devices, limiting exposure to trusted IP addresses only. 2. Implement strict firewall rules and network segmentation to isolate these devices from untrusted networks, including the internet. 3. Monitor network traffic for unusual POST requests targeting the /usr/lib/lua/luci/controller/api/rcmsAPI.lua endpoint, especially those invoking action_deal_update. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect command injection attempts. 5. Regularly audit device configurations and logs for signs of compromise or suspicious activity. 6. Engage with Ruijie Networks for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 7. Consider deploying application-layer gateways or web application firewalls (WAFs) capable of filtering malicious payloads targeting the vulnerable API. 8. Educate network administrators about the risks and signs of exploitation to enhance incident response readiness.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693b0fc17d4c6f31f7bf9f38
Added to database: 12/11/2025, 6:38:57 PM
Last enriched: 12/19/2025, 5:34:26 AM
Last updated: 2/7/2026, 1:49:47 PM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.