CVE-2025-56127

|
CVE-2025-56127 Ruijie RG-BCR600W OS Command Injection vulnerability security high severity CVE database router security firmware vulnerability

Summary

CVE-2025-56127 is a HIGH severity OS Command Injection vulnerability affecting Ruijie RG-BCR RG-BCR600W routers. This vulnerability allows unauthenticated attackers to execute arbitrary commands on the underlying operating system via a crafted POST request.

Successful exploitation can lead to complete system compromise, including data exfiltration, denial of service, and potentially using the router as a pivot point for further attacks within the network.

Technical Details

CVE-2025-56127 is an OS Command Injection vulnerability located in the /usr/lib/lua/luci/controller/admin/common.lua file of the Ruijie RG-BCR RG-BCR600W firmware. The vulnerability exists within the get_wanobj function. This function is accessible via a POST request and improperly sanitizes user-supplied input before passing it to a system command.

Specifically, an attacker can inject arbitrary operating system commands into the parameters of the get_wanobj function. When the router processes this request, the injected commands are executed with the privileges of the web server process, typically root, allowing for complete system compromise. The lack of input validation and sanitization on the parameters passed to the get_wanobj function is the root cause of this vulnerability.

The attack vector involves sending a specially crafted POST request to the router's web interface. This request includes malicious commands embedded within the parameters expected by the get_wanobj function. The router then executes these commands without proper validation, leading to the vulnerability.

Affected Products and Versions

  • Ruijie RG-BCR RG-BCR600W with vulnerable firmware versions.

Impact Assessment

Successful exploitation of CVE-2025-56127 can have severe consequences for affected users and organizations.

  • Complete System Compromise: Attackers can gain full control of the router, allowing them to modify configurations, install malware, and intercept network traffic.
  • Data Exfiltration: Sensitive data stored on the router or transmitted through it can be stolen by attackers.
  • Denial of Service: Attackers can crash the router or disrupt its functionality, causing network outages.
  • Network Pivot Point: A compromised router can be used as a launching point for attacks against other devices on the network.
  • Reputation Damage: A successful attack can damage the reputation of the affected organization.

Remediation

Immediate Actions

  • Apply the Security Patch: Ruijie has released a security patch to address this vulnerability. Immediately update the firmware of your RG-BCR RG-BCR600W router to the latest version.
  • Monitor Network Traffic: Monitor network traffic for suspicious activity, such as unusual outbound connections or attempts to access the router's web interface from unauthorized IP addresses.
  • Restrict Access: Restrict access to the router's web interface to only authorized users and IP addresses.

Long-term Solutions

  • Implement Input Validation: Ensure that all user-supplied input is properly validated and sanitized before being used in system commands.
  • Regular Security Audits: Conduct regular security audits of the router's firmware to identify and address potential vulnerabilities.
  • Principle of Least Privilege: Run the web server process with the minimum necessary privileges to reduce the impact of a successful attack.

Detection & Scanning

This vulnerability can be detected by analyzing network traffic for suspicious POST requests to the /usr/lib/lua/luci/controller/admin/common.lua endpoint with potentially malicious commands embedded in the parameters. Security scanners and intrusion detection systems can be configured to identify such patterns.

Scan Your Network

Secably AI Scanner can detect this and 50+ other vulnerabilities automatically.

Start Free Scan

Scan Your Website for Vulnerabilities

Discover security issues before attackers do. Our AI-powered scanner checks for the vulnerabilities discussed in this guide and more.

Start Free Scan