Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56120: n/a

0
High
VulnerabilityCVE-2025-56120cvecve-2025-56120
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie X60 PRO X60_10212014RG-X60 PRO V1.00/V2.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:36:18 UTC

Technical Analysis

CVE-2025-56120 is an OS Command Injection vulnerability identified in Ruijie X60 PRO network devices, specifically in firmware versions V1.00 and V2.00. The vulnerability resides in the Lua script located at /usr/local/lua/dev_config/config_retain.lua, within the module_set functionality. An attacker with low privileges can send a specially crafted POST request to this module_set endpoint, which fails to properly sanitize input, allowing arbitrary OS commands to be executed on the underlying system. This type of injection (CWE-78) can lead to full system compromise, including unauthorized access, data exfiltration, and disruption of network services. The CVSS v3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with its network attack vector, low attack complexity, and no requirement for user interaction. Although no public exploits are reported yet, the vulnerability's characteristics make it a prime target for attackers once exploit code becomes available. The lack of available patches at the time of disclosure increases the urgency for affected organizations to implement interim mitigations. This vulnerability is particularly concerning for environments where Ruijie X60 PRO devices serve as critical network infrastructure components, as exploitation could lead to widespread network disruption or compromise.

Potential Impact

For European organizations, exploitation of CVE-2025-56120 could result in severe operational disruptions, data breaches, and loss of control over network infrastructure. Given the Ruijie X60 PRO's role as a network device, attackers could leverage this vulnerability to pivot within internal networks, exfiltrate sensitive data, or launch further attacks against connected systems. Critical sectors such as telecommunications, finance, healthcare, and government agencies that deploy these devices may face heightened risks, including service outages and regulatory compliance violations under GDPR due to potential data exposure. The vulnerability's ability to compromise device integrity and availability could also impact business continuity and damage organizational reputation. Since the attack requires only low privileges and no user interaction, the threat surface is broad, increasing the likelihood of successful exploitation if devices are exposed to untrusted networks or insufficiently protected management interfaces.

Mitigation Recommendations

1. Immediately restrict network access to the management interfaces of Ruijie X60 PRO devices, ensuring only trusted administrators can reach the module_set endpoint. 2. Implement network segmentation to isolate vulnerable devices from critical infrastructure and limit lateral movement in case of compromise. 3. Monitor network traffic for anomalous POST requests targeting /usr/local/lua/dev_config/config_retain.lua or the module_set functionality, using intrusion detection/prevention systems with custom signatures. 4. Apply strict input validation and filtering at network perimeters to block suspicious payloads attempting command injection. 5. Engage with Ruijie support to obtain firmware updates or patches as soon as they become available and plan for prompt deployment. 6. Conduct regular vulnerability assessments and penetration testing focused on network devices to identify and remediate similar issues proactively. 7. Maintain comprehensive logging and alerting on device management activities to detect potential exploitation attempts early. 8. Educate network administrators about the risks and signs of exploitation related to this vulnerability to enhance incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0fc27d4c6f31f7bf9f6d

Added to database: 12/11/2025, 6:38:58 PM

Last enriched: 12/19/2025, 5:36:18 AM

Last updated: 2/7/2026, 6:37:19 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats