CVE-2025-56110
📋 TL;DR
This CVE describes an OS command injection vulnerability in Ruijie RG-BCR860 routers that allows attackers to execute arbitrary commands via a crafted POST request to a specific API endpoint. Attackers can gain remote code execution on affected devices, potentially compromising network infrastructure. Organizations using Ruijie RG-BCR860 routers are affected.
💻 Affected Systems
- Ruijie RG-BCR860
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the router allowing attackers to pivot to internal networks, intercept/modify traffic, install persistent backdoors, or use the device as a botnet node.
Likely Case
Attackers gain shell access to the router, enabling them to reconfigure network settings, intercept traffic, or use the device for further attacks.
If Mitigated
Limited impact if device is behind firewalls with strict ingress filtering and network segmentation prevents lateral movement.
🎯 Exploit Status
Exploit requires sending a crafted POST request to /usr/lib/lua/luci/controller/api/rcmsAPI.lua endpoint. Public PoC available in GitHub repository.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check Ruijie official website for security advisories
2. Download latest firmware if available
3. Backup current configuration
4. Upload and install new firmware via web interface
5. Restart device
6. Restore configuration if needed
🔧 Temporary Workarounds
Disable Web Management Interface
linuxDisable the web management interface to prevent exploitation via the vulnerable API endpoint
# Via CLI: disable web management
# Configuration depends on specific Ruijie CLI syntax
Network Access Control
linuxRestrict access to router management interface using firewall rules
# Example iptables rule to restrict access to management IP
# iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
# iptables -A INPUT -p tcp --dport 80 -j DROP
🧯 If You Can't Patch
- Isolate affected routers in separate VLAN with strict firewall rules
- Implement network monitoring for suspicious POST requests to /usr/lib/lua/luci/controller/api/rcmsAPI.lua
🔍 How to Verify
Check if Vulnerable:
Check if device responds to POST requests at the vulnerable endpoint. Use curl: curl -X POST http://router-ip/usr/lib/lua/luci/controller/api/rcmsAPI.lua
Check Version:
# Check firmware version via web interface or CLI
# CLI command varies by Ruijie device model
Verify Fix Applied:
After applying workarounds, verify the endpoint is no longer accessible or properly sanitizes input
📡 Detection & Monitoring
Log Indicators:
- POST requests to /usr/lib/lua/luci/controller/api/rcmsAPI.lua with command injection patterns
- Unusual command execution in system logs
- Failed authentication attempts followed by API access
Network Indicators:
- Unusual outbound connections from router
- POST requests to router management interface from unexpected sources
- Traffic patterns indicating command execution
SIEM Query:
source="router_logs" AND (url="/usr/lib/lua/luci/controller/api/rcmsAPI.lua" OR cmd="*;*" OR cmd="*|*" OR cmd="*`*" OR cmd="*$(*)")