Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 18 Dec 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ruijienetworks
Ruijienetworks reyee Os |
|
| CPEs | cpe:2.3:o:ruijienetworks:reyee_os:1.204.1614:*:*:*:*:*:*:* | |
| Vendors & Products |
Ruijienetworks
Ruijienetworks reyee Os |
|
| Metrics |
cvssV3_1
|
Wed, 17 Dec 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ruijie
Ruijie reyee Os |
|
| Vendors & Products |
Ruijie
Ruijie reyee Os |
Mon, 15 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ReyeeOS 1.204.1614 contains an unencrypted CWMP communication vulnerability that allows attackers to intercept and manipulate device communication through a man-in-the-middle attack. Attackers can create a fake CWMP server to inject and execute arbitrary commands on Ruijie Reyee Cloud devices by exploiting the unprotected HTTP polling requests. | |
| Title | ReyeeOS 1.204.1614 Man-in-the-Middle Remote Code Execution via CWMP | |
| Weaknesses | CWE-319 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-15T21:47:21.231Z
Reserved: 2025-12-13T14:25:04.999Z
Link: CVE-2023-53881
Updated: 2025-12-15T21:39:54.326Z
Status : Analyzed
Published: 2025-12-15T21:15:50.993
Modified: 2025-12-18T22:38:22.163
Link: CVE-2023-53881
No data.
OpenCVE Enrichment
Updated: 2025-12-17T14:29:13Z