Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56122: n/a

0
Unknown
VulnerabilityCVE-2025-56122cvecve-2025-56122
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie RG-EW1800GX PRO B11P226_EW1800GX-PRO_10223117 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.

AI-Powered Analysis

AILast updated: 12/11/2025, 19:10:02 UTC

Technical Analysis

CVE-2025-56122 is a critical OS Command Injection vulnerability discovered in the Ruijie RG-EW1800GX PRO router firmware version B11P226_EW1800GX-PRO_10223117. The flaw resides in the module_get function within the /usr/local/lua/dev_sta/networkConnect.lua script, which processes POST requests. An attacker can craft a malicious POST request that injects arbitrary operating system commands, which the device executes with elevated privileges. This allows full control over the router, including the ability to alter configurations, intercept or redirect network traffic, deploy malware, or pivot into internal networks. The vulnerability does not require prior authentication, making it exploitable remotely by any attacker who can reach the device's management interface. No CVSS score has been assigned yet, and no public exploits have been reported, but the nature of the vulnerability suggests a high risk. The Ruijie RG-EW1800GX PRO is commonly deployed in enterprise and ISP environments, making this a significant threat to network infrastructure. The lack of a patch or mitigation details at this time necessitates immediate risk management and monitoring. The vulnerability highlights the risks of insecure input validation in embedded device web interfaces, a common attack vector in network equipment.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to complete compromise of affected routers, resulting in loss of confidentiality, integrity, and availability of network communications. Attackers could intercept sensitive data, disrupt network services, or use compromised devices as footholds for further attacks within corporate or critical infrastructure networks. This could impact sectors such as telecommunications, finance, government, and manufacturing, where Ruijie equipment is deployed. The ability to execute arbitrary commands remotely without authentication increases the risk of widespread exploitation, potentially causing network outages or data breaches. Additionally, compromised routers could be used to launch attacks against other targets, amplifying the threat. The absence of a patch means organizations must rely on network segmentation and access controls to mitigate risk temporarily. The impact is particularly severe for organizations with remote management interfaces exposed to untrusted networks, including the internet.

Mitigation Recommendations

1. Immediately restrict access to the management interface of Ruijie RG-EW1800GX PRO devices to trusted internal networks only, using firewall rules or VPNs. 2. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 3. Monitor network traffic for unusual POST requests targeting /usr/local/lua/dev_sta/networkConnect.lua or the module_get function, using IDS/IPS solutions with custom signatures. 4. Disable remote management interfaces if not strictly necessary. 5. Regularly audit device configurations and logs for signs of compromise or unauthorized access. 6. Engage with Ruijie support or vendors for firmware updates or patches addressing this vulnerability and apply them promptly once available. 7. Employ endpoint detection and response (EDR) tools on connected systems to detect lateral movement attempts originating from compromised routers. 8. Educate network administrators about this vulnerability and enforce strict credential management and multi-factor authentication for device access where possible. 9. Consider deploying network anomaly detection systems to identify unusual command execution patterns or traffic flows. 10. Prepare incident response plans specifically addressing router compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b13487d4c6f31f7c065a8

Added to database: 12/11/2025, 6:54:00 PM

Last enriched: 12/11/2025, 7:10:02 PM

Last updated: 12/12/2025, 4:00:24 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats