CVE-2025-56099

8.8 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in Ruijie RG-YST access points that allows attackers to execute arbitrary commands on the device. Attackers can exploit this by sending a crafted POST request to the pwdmodify endpoint. Organizations using Ruijie RG-YST AP_3.0(1)B11P280YST250F access points are affected.

💻 Affected Systems

Products:
  • Ruijie RG-YST Access Point
Versions: AP_3.0(1)B11P280YST250F
Operating Systems: Embedded Linux/Lua-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default web interface configuration. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to gain root access, install persistent backdoors, pivot to internal networks, and exfiltrate sensitive data.

🟠

Likely Case

Unauthorized command execution leading to device takeover, network disruption, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH - If the web interface is exposed to the internet, attackers can directly exploit this vulnerability without network access.
🏢 Internal Only: HIGH - Even internally, any attacker with network access to the device can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has publicly available proof-of-concept code, making exploitation trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check Ruijie official website for firmware updates. If available, download and apply the latest firmware patch following vendor instructions.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to the web interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable Web Interface

linux

Disable the vulnerable web interface if not required

service httpd stop
chkconfig httpd off

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from critical networks
  • Deploy web application firewall (WAF) rules to block malicious POST requests to pwdmodify endpoint

🔍 How to Verify

Check if Vulnerable:

Check if the device responds to POST requests at /usr/lib/lua/luci/modules/common.lua pwdmodify endpoint with command injection payloads

Check Version:

ssh admin@device_ip 'cat /etc/version' or check web interface system info page

Verify Fix Applied:

Test if command injection payloads no longer execute when sent to the vulnerable endpoint

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to pwdmodify endpoint
  • Command execution patterns in system logs
  • Failed authentication attempts followed by POST requests

Network Indicators:

  • POST requests containing shell metacharacters (;, |, &, $)
  • Unusual outbound connections from access points
  • Traffic to pwdmodify endpoint from unexpected sources

SIEM Query:

source="ap_logs" AND (uri="/usr/lib/lua/luci/modules/common.lua" OR uri="*pwdmodify*") AND (method="POST") AND (payload="*;*" OR payload="*|*" OR payload="*&*" OR payload="*$*")

🔗 References

📤 Share & Export