CVE-2025-56124: n/a
OS Command Injection vulnerability in Ruijie X60 PRO X60_10212014RG-X60 PRO V1.00/V2.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.
AI Analysis
Technical Summary
CVE-2025-56124 is an OS command injection vulnerability identified in Ruijie X60 PRO network devices, specifically affecting firmware versions V1.00 and V2.00. The vulnerability resides in the Lua script /usr/local/lua/dev_sta/networkConnect.lua within the module_get function, which processes POST requests insecurely. An attacker with low privileges and local access can craft a malicious POST request that injects arbitrary OS commands, leading to full compromise of the device. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that input is not properly sanitized before being passed to system-level command execution. The CVSS v3.1 base score is 7.8, reflecting high severity due to high impact on confidentiality, integrity, and availability, combined with low attack complexity and no user interaction required. Although no public exploits or patches are currently available, the vulnerability poses a significant risk to affected devices. The lack of authentication requirement is mitigated by the need for local access, which could be achieved via network access if management interfaces are exposed or compromised. This vulnerability could allow attackers to execute arbitrary commands, potentially leading to device takeover, network pivoting, data exfiltration, or denial of service.
Potential Impact
For European organizations, exploitation of CVE-2025-56124 could result in severe operational disruptions and data breaches. Ruijie X60 PRO devices are typically used in enterprise and service provider networks, so compromise could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. Confidentiality is at risk due to potential data leakage; integrity is compromised as attackers can alter device configurations or network traffic; availability can be impacted by denial-of-service conditions caused by malicious commands. Critical infrastructure sectors such as telecommunications, finance, and government agencies using these devices may face heightened risks. The vulnerability's requirement for local access means that organizations with exposed management interfaces or weak internal network segmentation are particularly vulnerable. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency of mitigation.
Mitigation Recommendations
European organizations should immediately audit their network to identify Ruijie X60 PRO devices running vulnerable firmware versions. Restrict access to device management interfaces by implementing strict network segmentation and access control lists (ACLs) to limit local access only to trusted administrators. Employ network monitoring and intrusion detection systems to detect anomalous POST requests targeting the networkConnect.lua module. Disable or restrict unnecessary services and interfaces that could provide local access to attackers. Establish a vulnerability management process to track Ruijie firmware updates and apply patches promptly once released. Consider deploying host-based application firewalls or endpoint protection on management workstations to prevent exploitation attempts. Conduct regular security training for administrators to recognize and respond to suspicious activity. If possible, implement multi-factor authentication and encrypted management channels to reduce the risk of unauthorized access. Finally, prepare incident response plans specifically addressing potential exploitation scenarios of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-56124: n/a
Description
OS Command Injection vulnerability in Ruijie X60 PRO X60_10212014RG-X60 PRO V1.00/V2.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.
AI-Powered Analysis
Technical Analysis
CVE-2025-56124 is an OS command injection vulnerability identified in Ruijie X60 PRO network devices, specifically affecting firmware versions V1.00 and V2.00. The vulnerability resides in the Lua script /usr/local/lua/dev_sta/networkConnect.lua within the module_get function, which processes POST requests insecurely. An attacker with low privileges and local access can craft a malicious POST request that injects arbitrary OS commands, leading to full compromise of the device. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that input is not properly sanitized before being passed to system-level command execution. The CVSS v3.1 base score is 7.8, reflecting high severity due to high impact on confidentiality, integrity, and availability, combined with low attack complexity and no user interaction required. Although no public exploits or patches are currently available, the vulnerability poses a significant risk to affected devices. The lack of authentication requirement is mitigated by the need for local access, which could be achieved via network access if management interfaces are exposed or compromised. This vulnerability could allow attackers to execute arbitrary commands, potentially leading to device takeover, network pivoting, data exfiltration, or denial of service.
Potential Impact
For European organizations, exploitation of CVE-2025-56124 could result in severe operational disruptions and data breaches. Ruijie X60 PRO devices are typically used in enterprise and service provider networks, so compromise could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. Confidentiality is at risk due to potential data leakage; integrity is compromised as attackers can alter device configurations or network traffic; availability can be impacted by denial-of-service conditions caused by malicious commands. Critical infrastructure sectors such as telecommunications, finance, and government agencies using these devices may face heightened risks. The vulnerability's requirement for local access means that organizations with exposed management interfaces or weak internal network segmentation are particularly vulnerable. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency of mitigation.
Mitigation Recommendations
European organizations should immediately audit their network to identify Ruijie X60 PRO devices running vulnerable firmware versions. Restrict access to device management interfaces by implementing strict network segmentation and access control lists (ACLs) to limit local access only to trusted administrators. Employ network monitoring and intrusion detection systems to detect anomalous POST requests targeting the networkConnect.lua module. Disable or restrict unnecessary services and interfaces that could provide local access to attackers. Establish a vulnerability management process to track Ruijie firmware updates and apply patches promptly once released. Consider deploying host-based application firewalls or endpoint protection on management workstations to prevent exploitation attempts. Conduct regular security training for administrators to recognize and respond to suspicious activity. If possible, implement multi-factor authentication and encrypted management channels to reduce the risk of unauthorized access. Finally, prepare incident response plans specifically addressing potential exploitation scenarios of this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693b13487d4c6f31f7c065b2
Added to database: 12/11/2025, 6:54:00 PM
Last enriched: 12/19/2025, 5:37:11 AM
Last updated: 2/6/2026, 10:09:49 PM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2068: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25760: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in BishopFox sliver
MediumCVE-2026-1727: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Google Cloud Gemini Enterprise (formerly Agentspace)
CriticalCVE-2026-1731: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in BeyondTrust Remote Support(RS) & Privileged Remote Access(PRA)
CriticalCVE-2026-25732: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in zauberzeug nicegui
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.