CVE-2025-56109

8.8 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in Ruijie RG-BCR860 routers that allows attackers to execute arbitrary commands on the device. Attackers can exploit this by sending a crafted POST request to the wireless management interface. Organizations using Ruijie RG-BCR860 routers are affected.

💻 Affected Systems

Products:
  • Ruijie RG-BCR860
Versions: All versions prior to patch
Operating Systems: Embedded Linux/Lua-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the wireless management interface component in the LuCI web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to network infiltration, data exfiltration, and use as a pivot point for attacking internal networks.

🟠

Likely Case

Router takeover allowing traffic interception, credential theft, and deployment of persistent backdoors.

🟢

If Mitigated

Limited impact if network segmentation and proper access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they gain network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the management interface but appears straightforward based on available documentation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Contact Ruijie support for patch availability. 2. If patch is available, download from official vendor portal. 3. Backup configuration. 4. Apply firmware update. 5. Verify fix and restore configuration if needed.

🔧 Temporary Workarounds

Disable wireless management interface

linux

Temporarily disable the vulnerable wireless management component

# Requires access to device CLI
# Specific commands depend on Ruijie CLI syntax

Restrict network access

linux

Limit access to management interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Isolate affected routers in separate VLAN with strict access controls
  • Implement network monitoring for suspicious POST requests to /usr/lib/lua/luci/control/admin/wireless.lua

🔍 How to Verify

Check if Vulnerable:

Check if device responds to POST requests at the vulnerable endpoint and test with safe command injection payloads

Check Version:

show version (Ruijie CLI command)

Verify Fix Applied:

Test if command injection attempts are properly sanitized or blocked after applying vendor patch

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wireless.lua
  • Command execution patterns in system logs
  • Failed authentication attempts to management interface

Network Indicators:

  • Suspicious HTTP POST traffic to router management interface
  • Unexpected outbound connections from router

SIEM Query:

source="router_logs" AND (url="/usr/lib/lua/luci/control/admin/wireless.lua" OR cmd="action_wireless")

🔗 References

📤 Share & Export