Project Subscriptions
| Vendors | Products |
|---|---|
|
Ruijie
Subscribe
|
Eg3210
Subscribe
Eg3220
Subscribe
Eg3230
Subscribe
Eg3250
Subscribe
Nbr1000g-c
Subscribe
Nbr1000g-e
Subscribe
Nbr108g-p
Subscribe
Nbr1300g-e
Subscribe
Nbr1700g-e
Subscribe
Nbr2000g-c
Subscribe
Nbr2100g-e
Subscribe
Nbr2500d-e
Subscribe
Nbr3000d-e
Subscribe
Nbr3000g-s
Subscribe
Nbr6120-e
Subscribe
Nbr6135-e
Subscribe
Nbr6205-e
Subscribe
Nbr6210-e
Subscribe
Nbr6215-e
Subscribe
Nbr800g
Subscribe
Nbr950g
Subscribe
Rg-eg1000c
Subscribe
Rg-eg2000ce
Subscribe
Rg-eg2000f
Subscribe
Rg-eg2000ge
Subscribe
Rg-eg2000k
Subscribe
Rg-eg2000l
Subscribe
Rg-eg2000se
Subscribe
Rg-eg2000ue
Subscribe
Rg-eg2000xe
Subscribe
Rg-eg2100-p
Subscribe
Rg-eg3000ce
Subscribe
Rg-eg3000ge
Subscribe
Rg-eg3000me
Subscribe
Rg-eg3000se
Subscribe
Rg-eg3000ue
Subscribe
Rg-eg3000xe
Subscribe
Rg-eg3230
Subscribe
Rg-eg3250
Subscribe
Rg-nbr6120-e
Subscribe
Rg-nbr6205-e
Subscribe
Rg-nbr6210-e
Subscribe
Rg-nbr6215-e
Subscribe
|
|
Ruijienetworks
Subscribe
|
Rg-nbr2100g-e
Subscribe
|
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 20 Nov 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Various Ruijie Gateway EG and NBR models firmware versions 11.1(6)B9P1 < 11.9(4)B12P1 contain a code execution vulnerability in the EWEB management system that can be abused via front-end functionality. Attackers can exploit front-end code when features such as guest authentication, local server authentication, or screen mirroring are enabled to gain access or execute commands on affected devices. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-06-07 UTC. | Various Ruijie Gateway EG and NBR models firmware versions 11.1(6)B9P1 < 11.9(4)B12P1 contain a code execution vulnerability in the EWEB management system that can be abused via front-end functionality. Attackers can exploit front-end code when features such as guest authentication, local server authentication, or screen mirroring are enabled to gain access or execute commands on affected devices. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-02-05 UTC. |
| First Time appeared |
Ruijie rg-eg3230
Ruijie rg-eg3250 Ruijie rg-nbr6120-e Ruijie rg-nbr6205-e Ruijie rg-nbr6210-e Ruijie rg-nbr6215-e Ruijienetworks Ruijienetworks rg-nbr2100g-e |
|
| CPEs | cpe:2.3:h:ruijie:eg3210:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:eg3220:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:nbr1000g-c:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:nbr1000g-e:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:nbr108g-p:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:nbr1300g-e:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:nbr1700g-e:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:nbr2000g-c:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:nbr2500d-e:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:nbr3000d-e:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:nbr3000g-s:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:nbr6135-e:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:nbr800g:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:nbr950g:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg1000c:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg2000ce:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg2000f:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg2000ge:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg2000k:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg2000l:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg2000se:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg2000ue:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg2000xe:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg2100-p:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg3000ce:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg3000ge:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg3000me:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg3000se:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg3000ue:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg3000xe:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg3230:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-eg3250:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-nbr6120-e:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-nbr6205-e:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-nbr6210-e:*:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-nbr6215-e:*:*:*:*:*:*:*:* cpe:2.3:h:ruijienetworks:rg-nbr2100g-e:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ruijie rg-eg3230
Ruijie rg-eg3250 Ruijie rg-nbr6120-e Ruijie rg-nbr6205-e Ruijie rg-nbr6210-e Ruijie rg-nbr6215-e Ruijienetworks Ruijienetworks rg-nbr2100g-e |
Thu, 13 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 10 Nov 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ruijie
Ruijie eg3210 Ruijie eg3220 Ruijie eg3230 Ruijie eg3250 Ruijie nbr1000g-c Ruijie nbr1000g-e Ruijie nbr108g-p Ruijie nbr1300g-e Ruijie nbr1700g-e Ruijie nbr2000g-c Ruijie nbr2100g-e Ruijie nbr2500d-e Ruijie nbr3000d-e Ruijie nbr3000g-s Ruijie nbr6120-e Ruijie nbr6135-e Ruijie nbr6205-e Ruijie nbr6210-e Ruijie nbr6215-e Ruijie nbr800g Ruijie nbr950g Ruijie rg-eg1000c Ruijie rg-eg2000ce Ruijie rg-eg2000f Ruijie rg-eg2000ge Ruijie rg-eg2000k Ruijie rg-eg2000l Ruijie rg-eg2000se Ruijie rg-eg2000ue Ruijie rg-eg2000xe Ruijie rg-eg2100-p Ruijie rg-eg3000ce Ruijie rg-eg3000ge Ruijie rg-eg3000me Ruijie rg-eg3000se Ruijie rg-eg3000ue Ruijie rg-eg3000xe |
|
| Vendors & Products |
Ruijie
Ruijie eg3210 Ruijie eg3220 Ruijie eg3230 Ruijie eg3250 Ruijie nbr1000g-c Ruijie nbr1000g-e Ruijie nbr108g-p Ruijie nbr1300g-e Ruijie nbr1700g-e Ruijie nbr2000g-c Ruijie nbr2100g-e Ruijie nbr2500d-e Ruijie nbr3000d-e Ruijie nbr3000g-s Ruijie nbr6120-e Ruijie nbr6135-e Ruijie nbr6205-e Ruijie nbr6210-e Ruijie nbr6215-e Ruijie nbr800g Ruijie nbr950g Ruijie rg-eg1000c Ruijie rg-eg2000ce Ruijie rg-eg2000f Ruijie rg-eg2000ge Ruijie rg-eg2000k Ruijie rg-eg2000l Ruijie rg-eg2000se Ruijie rg-eg2000ue Ruijie rg-eg2000xe Ruijie rg-eg2100-p Ruijie rg-eg3000ce Ruijie rg-eg3000ge Ruijie rg-eg3000me Ruijie rg-eg3000se Ruijie rg-eg3000ue Ruijie rg-eg3000xe |
Fri, 07 Nov 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Various Ruijie Gateway EG and NBR models firmware versions 11.1(6)B9P1 < 11.9(4)B12P1 contain a code execution vulnerability in the EWEB management system that can be abused via front-end functionality. Attackers can exploit front-end code when features such as guest authentication, local server authentication, or screen mirroring are enabled to gain access or execute commands on affected devices. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-06-07 UTC. | |
| Title | Ruijie Gateway EG & NBR Models v11.1(6)B9P1 - 11.9(4)B12P1 RCE | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-20T21:32:27.504Z
Reserved: 2025-10-30T15:45:57.762Z
Link: CVE-2020-36870
Updated: 2025-11-13T16:10:46.333Z
Status : Awaiting Analysis
Published: 2025-11-07T22:15:38.587
Modified: 2025-11-20T22:15:53.293
Link: CVE-2020-36870
No data.
OpenCVE Enrichment
Updated: 2025-11-10T09:33:46Z