OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the pwdmodify in file /usr/lib/lua/luci/modules/common.lua.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 26 Jan 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Ruijie rg-eap602
Ruijie rg-eap602 Firmware
Ruijie rg-est310
Ruijie rg-est310 Firmware
Ruijie rg-est350
Ruijie rg-est350 Firmware
Ruijie rg-ew300 Pro
Ruijie rg-ew300 Pro Firmware
Ruijie x30 Pro
Ruijie x30 Pro Firmware
CPEs cpe:2.3:h:ruijie:rg-eap602:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-est310:2.0:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-est350:2.0:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-ew300_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:x30_pro:1.0:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:rg-eap602_firmware:3.0\(1\)b2p55:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:rg-est310_firmware:3.0\(1\)b11p211:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:rg-est350_firmware:3.0\(1\)b11p221:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:rg-ew300_pro_firmware:3.0\(1\)b11p219:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:x30_pro_firmware:-:*:*:*:*:*:*:*
Vendors & Products Ruijie rg-eap602
Ruijie rg-eap602 Firmware
Ruijie rg-est310
Ruijie rg-est310 Firmware
Ruijie rg-est350
Ruijie rg-est350 Firmware
Ruijie rg-ew300 Pro
Ruijie rg-ew300 Pro Firmware
Ruijie x30 Pro
Ruijie x30 Pro Firmware

Fri, 12 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-78
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Ruijie
Ruijie x30-pro
Vendors & Products Ruijie
Ruijie x30-pro

Thu, 11 Dec 2025 18:45:00 +0000

Type Values Removed Values Added
Description OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the pwdmodify in file /usr/lib/lua/luci/modules/common.lua.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-12T17:35:46.788Z

Reserved: 2025-08-16T00:00:00.000Z

Link: CVE-2025-56108

cve-icon Vulnrichment

Updated: 2025-12-12T17:31:17.821Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-11T19:15:56.443

Modified: 2026-01-26T22:38:34.703

Link: CVE-2025-56108

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-12T08:49:37Z

Weaknesses