CVE-2025-56122

8.8 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in Ruijie RG-EW1800GX PRO wireless access points. Attackers can execute arbitrary commands on the device by sending a specially crafted POST request to the vulnerable endpoint. Organizations using affected Ruijie devices are at risk.

💻 Affected Systems

Products:
  • Ruijie RG-EW1800GX PRO
Versions: B11P226_EW1800GX-PRO_10223117
Operating Systems: Embedded Linux/OpenWRT-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration and requires no special settings to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise leading to network pivot, data exfiltration, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Unauthorized command execution allowing network reconnaissance, credential harvesting, or device configuration changes.

🟢

If Mitigated

Limited impact if network segmentation, WAF filtering, and strict access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via HTTP POST requests, making internet-facing devices particularly vulnerable to remote attacks.
🏢 Internal Only: HIGH - Even internally accessible devices are at significant risk from insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub repository contains detailed exploitation information and proof-of-concept code, making this easily weaponizable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available at this time

Restart Required: No

Instructions:

No official patch available. Monitor Ruijie's security advisories for updates and apply immediately when released.

🔧 Temporary Workarounds

Network Access Restriction

linux

Block access to the vulnerable endpoint using firewall rules or web application firewall.

iptables -A INPUT -p tcp --dport 80 -m string --string "POST /usr/local/lua/dev_sta/networkConnect.lua" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "POST /usr/local/lua/dev_sta/networkConnect.lua" --algo bm -j DROP

Endpoint Isolation

all

Segment affected devices to prevent lateral movement if compromised.

🧯 If You Can't Patch

  • Isolate affected devices in a dedicated VLAN with strict egress filtering
  • Implement network-based intrusion detection to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or SSH: System > Device Information > Firmware Version

Check Version:

ssh admin@device-ip "cat /etc/version" or check web interface at http://device-ip

Verify Fix Applied:

Verify firmware version has been updated beyond B11P226_EW1800GX-PRO_10223117

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /usr/local/lua/dev_sta/networkConnect.lua with unusual parameters
  • System logs showing unexpected command execution or process creation

Network Indicators:

  • HTTP POST requests containing shell metacharacters (;, |, &, $, etc.) to the vulnerable endpoint
  • Unusual outbound connections from the access point

SIEM Query:

source="ruijie-firewall" AND (url="/usr/local/lua/dev_sta/networkConnect.lua" AND method="POST")

🔗 References

📤 Share & Export