CVE-2025-11141

4.7 MEDIUM

📋 TL;DR

This CVE describes an OS command injection vulnerability in Ruijie NBR2100G-E routers. Attackers can remotely execute arbitrary commands by manipulating the 'city' parameter in the /itbox_pi/branch_passw.php endpoint. Organizations using Ruijie NBR2100G-E routers up to September 19, 2025 are affected.

💻 Affected Systems

Products:
  • Ruijie NBR2100G-E
Versions: All versions up to 20250919
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default web interface configuration. Any Ruijie NBR2100G-E with the vulnerable firmware version is affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands with router privileges, potentially gaining persistent access, stealing credentials, or pivoting to internal networks.

🟠

Likely Case

Attackers execute limited commands to modify router configurations, disrupt network services, or deploy malware on the device.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the router itself without lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on GitHub. The vulnerability requires access to the web interface but may be exploitable without authentication depending on configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

Contact Ruijie support for firmware updates. Since vendor has not responded, consider alternative mitigation strategies.

🔧 Temporary Workarounds

Block vulnerable endpoint

all

Use firewall rules or web application filtering to block access to /itbox_pi/branch_passw.php

Restrict web interface access

all

Limit access to router web interface to trusted IP addresses only

🧯 If You Can't Patch

  • Isolate affected routers in separate network segments
  • Implement strict outbound firewall rules to limit potential command and control

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface or CLI. If version is 20250919 or earlier, device is vulnerable.

Check Version:

Check via web interface at System > System Information or via CLI with 'show version'

Verify Fix Applied:

Verify firmware version is newer than 20250919. Test the vulnerable endpoint with safe payloads to confirm patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /itbox_pi/branch_passw.php with shell metacharacters in parameters
  • Unexpected command execution in system logs

Network Indicators:

  • Suspicious outbound connections from router to unknown IPs
  • Unusual traffic patterns from router management interface

SIEM Query:

source="router_logs" AND (uri="/itbox_pi/branch_passw.php" AND (param="city" AND value MATCHES "[;&|`$()]"))

🔗 References

📤 Share & Export