Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9424: OS Command Injection in Ruijie WS7204-A

0
Medium
VulnerabilityCVE-2025-9424cvecve-2025-9424
Published: Mon Aug 25 2025 (08/25/2025, 22:32:10 UTC)
Source: CVE Database V5
Vendor/Project: Ruijie
Product: WS7204-A

Description

A vulnerability was identified in Ruijie WS7204-A 2017.06.15. Affected by this vulnerability is an unknown functionality of the file /itbox_pi/branch_import.php?a=branch_list. Such manipulation of the argument province leads to os command injection. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/02/2025, 01:10:25 UTC

Technical Analysis

CVE-2025-9424 is a security vulnerability identified in the Ruijie WS7204-A network device firmware version 2017.06.15. The vulnerability exists in an unspecified functionality within the file /itbox_pi/branch_import.php, specifically in the handling of the 'province' argument in the 'branch_list' parameter. Improper sanitization or validation of this input allows an attacker to perform OS command injection remotely. This means that an attacker can inject arbitrary operating system commands through the vulnerable parameter, potentially gaining unauthorized control over the affected device. The vulnerability can be exploited without user interaction and does not require prior authentication, increasing the risk of remote compromise. Although the vendor was notified early, no response or patch has been provided, and a public exploit is available, which raises the risk of exploitation. The CVSS v4.0 base score is 5.1 (medium severity), reflecting the network attack vector, low complexity, no privileges required, no user interaction, and limited impact on confidentiality, integrity, and availability. However, the presence of a public exploit and lack of vendor mitigation increases the urgency of addressing this issue. The Ruijie WS7204-A is a network device likely used in enterprise or organizational environments, making this vulnerability a significant concern for network security and operational continuity.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized remote command execution on critical network infrastructure, potentially resulting in data breaches, network disruption, or lateral movement within internal networks. Given that the Ruijie WS7204-A is a network device, successful exploitation could compromise network traffic integrity and confidentiality, disrupt communications, or allow attackers to pivot to other systems. The lack of vendor response and patch availability increases the risk that attackers may leverage this vulnerability in targeted attacks or automated scanning campaigns. Organizations relying on these devices for branch connectivity or network management could face operational downtime or data exfiltration risks. Additionally, regulatory compliance requirements such as GDPR impose strict obligations on protecting personal data, and a breach stemming from this vulnerability could lead to legal and financial consequences for affected European entities.

Mitigation Recommendations

Since no official patch or vendor response is available, European organizations should implement compensating controls immediately. These include isolating the affected devices from untrusted networks, restricting management interfaces to trusted IP addresses via firewall rules, and monitoring network traffic for suspicious activity related to the /itbox_pi/branch_import.php endpoint. Network segmentation should be enforced to limit the potential spread of compromise. Organizations should also consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block command injection attempts targeting the vulnerable parameter. Regularly auditing device configurations and logs for anomalies is critical. If possible, upgrading to a newer, unaffected firmware version or replacing the device with a secure alternative should be prioritized. Finally, organizations should maintain an incident response plan to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-25T09:25:33.907Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ace80fad5a09ad0050f005

Added to database: 8/25/2025, 10:47:43 PM

Last enriched: 9/2/2025, 1:10:25 AM

Last updated: 10/10/2025, 11:17:01 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats