CVE-2025-65363

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated web users on Ruijie APs to execute arbitrary shell commands as root via command injection in the web_action.do endpoint. Attackers can disclose files, disrupt device operations, and potentially pivot to other network segments. Organizations using Ruijie APs with AP_RGOS 11.1.x are affected.

💻 Affected Systems

Products:
  • Ruijie Access Points
Versions: AP_RGOS 11.1.x
Operating Systems: AP_RGOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires web management interface access with valid credentials. All Ruijie APs running affected firmware versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise leading to network-wide disruption, credential theft, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Unauthorized file access, configuration modification, service disruption, and potential credential harvesting from the affected AP.

🟢

If Mitigated

Limited to authenticated users only, reducing exposure if strong authentication and access controls are implemented.

🌐 Internet-Facing: HIGH if web management interface is exposed to internet, as authenticated attackers can execute arbitrary commands.
🏢 Internal Only: MEDIUM as it requires authenticated access, but internal attackers or compromised accounts can exploit it.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the web interface. Public proof-of-concept exists in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://ruijie.com

Restart Required: No

Instructions:

Check Ruijie official website for security advisories and firmware updates. Apply recommended patches when available.

🔧 Temporary Workarounds

Restrict Web Interface Access

linux

Limit access to the web management interface to trusted IP addresses only using firewall rules.

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable Web Management Interface

all

Temporarily disable the web management interface if not required, using CLI management instead.

no service http-server
no service https-server

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Ruijie APs from critical network segments.
  • Enforce strong authentication policies and monitor for unusual web interface access patterns.

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or CLI: show version | include AP_RGOS

Check Version:

show version | include AP_RGOS

Verify Fix Applied:

Verify firmware version is updated beyond AP_RGOS 11.1.x and test command injection attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to web_action.do with command parameters
  • Multiple failed authentication attempts followed by successful login and web_action.do access
  • System logs showing unexpected shell command execution

Network Indicators:

  • HTTP/HTTPS traffic to AP web interface from unusual sources
  • Patterns of command injection attempts in web requests

SIEM Query:

source="ap_logs" AND (url="*web_action.do*" AND (param="*command*" OR param="*;*" OR param="*|*" OR param="*`*"))

🔗 References

📤 Share & Export