CVE-2025-56120

8.8 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in Ruijie X60 PRO routers that allows attackers to execute arbitrary commands on the device. Attackers can exploit this by sending a crafted POST request to the vulnerable endpoint. Organizations using Ruijie X60 PRO routers with affected firmware versions are at risk.

💻 Affected Systems

Products:
  • Ruijie X60 PRO
Versions: V1.00/V2.00
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web management interface component that handles configuration requests.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to network infiltration, data exfiltration, and use as a pivot point for attacking internal networks.

🟠

Likely Case

Router compromise allowing traffic interception, credential theft, and deployment of persistent backdoors.

🟢

If Mitigated

Limited impact if network segmentation and proper access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited via HTTP requests, making internet-facing devices particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal devices are still vulnerable to attacks from compromised internal hosts or malicious insiders.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a crafted HTTP POST request to the vulnerable endpoint. Public proof-of-concept code is available in the GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Monitor Ruijie's security advisories for updates and apply patches when released.

🔧 Temporary Workarounds

Disable Web Management Interface

linux

Disable the web management interface if not required for operations

Check router documentation for disabling web interface commands

Network Access Control

linux

Restrict access to router management interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected routers from critical systems
  • Deploy web application firewall (WAF) rules to block suspicious POST requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface or SSH. If version is V1.00 or V2.00, device is vulnerable.

Check Version:

ssh admin@router_ip 'cat /etc/version' or check web interface System Information page

Verify Fix Applied:

Verify firmware has been updated to a version beyond V2.00 or check that the vulnerable endpoint no longer accepts malicious input.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /usr/local/lua/dev_config/config_retain.lua
  • Suspicious command execution in system logs
  • Multiple failed authentication attempts followed by successful POST

Network Indicators:

  • HTTP POST requests containing shell metacharacters or command injection patterns
  • Unusual outbound connections from router to external IPs

SIEM Query:

source="router_logs" AND (uri="/usr/local/lua/dev_config/config_retain.lua" OR method="POST" AND (body CONTAINS "|" OR body CONTAINS ";" OR body CONTAINS "`" OR body CONTAINS "$"))

🔗 References

📤 Share & Export