CVE-2025-56120: n/a
OS Command Injection vulnerability in Ruijie X60 PRO X60_10212014RG-X60 PRO V1.00/V2.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.
AI Analysis
Technical Summary
CVE-2025-56120 is an OS Command Injection vulnerability identified in Ruijie X60 PRO network devices, specifically in firmware versions V1.00 and V2.00. The vulnerability resides in the Lua script located at /usr/local/lua/dev_config/config_retain.lua, within the module_set functionality. An attacker with low privileges can send a specially crafted POST request to this module_set endpoint, which fails to properly sanitize input, allowing arbitrary OS commands to be executed on the underlying system. This type of injection (CWE-78) can lead to full system compromise, including unauthorized access, data exfiltration, and disruption of network services. The CVSS v3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with its network attack vector, low attack complexity, and no requirement for user interaction. Although no public exploits are reported yet, the vulnerability's characteristics make it a prime target for attackers once exploit code becomes available. The lack of available patches at the time of disclosure increases the urgency for affected organizations to implement interim mitigations. This vulnerability is particularly concerning for environments where Ruijie X60 PRO devices serve as critical network infrastructure components, as exploitation could lead to widespread network disruption or compromise.
Potential Impact
For European organizations, exploitation of CVE-2025-56120 could result in severe operational disruptions, data breaches, and loss of control over network infrastructure. Given the Ruijie X60 PRO's role as a network device, attackers could leverage this vulnerability to pivot within internal networks, exfiltrate sensitive data, or launch further attacks against connected systems. Critical sectors such as telecommunications, finance, healthcare, and government agencies that deploy these devices may face heightened risks, including service outages and regulatory compliance violations under GDPR due to potential data exposure. The vulnerability's ability to compromise device integrity and availability could also impact business continuity and damage organizational reputation. Since the attack requires only low privileges and no user interaction, the threat surface is broad, increasing the likelihood of successful exploitation if devices are exposed to untrusted networks or insufficiently protected management interfaces.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of Ruijie X60 PRO devices, ensuring only trusted administrators can reach the module_set endpoint. 2. Implement network segmentation to isolate vulnerable devices from critical infrastructure and limit lateral movement in case of compromise. 3. Monitor network traffic for anomalous POST requests targeting /usr/local/lua/dev_config/config_retain.lua or the module_set functionality, using intrusion detection/prevention systems with custom signatures. 4. Apply strict input validation and filtering at network perimeters to block suspicious payloads attempting command injection. 5. Engage with Ruijie support to obtain firmware updates or patches as soon as they become available and plan for prompt deployment. 6. Conduct regular vulnerability assessments and penetration testing focused on network devices to identify and remediate similar issues proactively. 7. Maintain comprehensive logging and alerting on device management activities to detect potential exploitation attempts early. 8. Educate network administrators about the risks and signs of exploitation related to this vulnerability to enhance incident response readiness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-56120: n/a
Description
OS Command Injection vulnerability in Ruijie X60 PRO X60_10212014RG-X60 PRO V1.00/V2.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.
AI-Powered Analysis
Technical Analysis
CVE-2025-56120 is an OS Command Injection vulnerability identified in Ruijie X60 PRO network devices, specifically in firmware versions V1.00 and V2.00. The vulnerability resides in the Lua script located at /usr/local/lua/dev_config/config_retain.lua, within the module_set functionality. An attacker with low privileges can send a specially crafted POST request to this module_set endpoint, which fails to properly sanitize input, allowing arbitrary OS commands to be executed on the underlying system. This type of injection (CWE-78) can lead to full system compromise, including unauthorized access, data exfiltration, and disruption of network services. The CVSS v3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with its network attack vector, low attack complexity, and no requirement for user interaction. Although no public exploits are reported yet, the vulnerability's characteristics make it a prime target for attackers once exploit code becomes available. The lack of available patches at the time of disclosure increases the urgency for affected organizations to implement interim mitigations. This vulnerability is particularly concerning for environments where Ruijie X60 PRO devices serve as critical network infrastructure components, as exploitation could lead to widespread network disruption or compromise.
Potential Impact
For European organizations, exploitation of CVE-2025-56120 could result in severe operational disruptions, data breaches, and loss of control over network infrastructure. Given the Ruijie X60 PRO's role as a network device, attackers could leverage this vulnerability to pivot within internal networks, exfiltrate sensitive data, or launch further attacks against connected systems. Critical sectors such as telecommunications, finance, healthcare, and government agencies that deploy these devices may face heightened risks, including service outages and regulatory compliance violations under GDPR due to potential data exposure. The vulnerability's ability to compromise device integrity and availability could also impact business continuity and damage organizational reputation. Since the attack requires only low privileges and no user interaction, the threat surface is broad, increasing the likelihood of successful exploitation if devices are exposed to untrusted networks or insufficiently protected management interfaces.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of Ruijie X60 PRO devices, ensuring only trusted administrators can reach the module_set endpoint. 2. Implement network segmentation to isolate vulnerable devices from critical infrastructure and limit lateral movement in case of compromise. 3. Monitor network traffic for anomalous POST requests targeting /usr/local/lua/dev_config/config_retain.lua or the module_set functionality, using intrusion detection/prevention systems with custom signatures. 4. Apply strict input validation and filtering at network perimeters to block suspicious payloads attempting command injection. 5. Engage with Ruijie support to obtain firmware updates or patches as soon as they become available and plan for prompt deployment. 6. Conduct regular vulnerability assessments and penetration testing focused on network devices to identify and remediate similar issues proactively. 7. Maintain comprehensive logging and alerting on device management activities to detect potential exploitation attempts early. 8. Educate network administrators about the risks and signs of exploitation related to this vulnerability to enhance incident response readiness.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693b0fc27d4c6f31f7bf9f6d
Added to database: 12/11/2025, 6:38:58 PM
Last enriched: 12/19/2025, 5:36:18 AM
Last updated: 2/7/2026, 6:37:19 AM
Views: 74
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.