Impact
Ap180 series routers running firmware versions prior to a specified build contain an operating system command injection flaw that permits the execution of arbitrary commands. This means an attacker can gain full control of the device, potentially hijacking the wireless access point, exposing network traffic, or using it as a foothold for further attacks. The weakness is classified as input that is improperly validated before being passed to the system shell.
Affected Systems
Affected products include Ruijie Networks’ AP180 series: AP180 with any Japan firmware version, AP180(JP) with firmware V1.xx, AP180-AC with firmware V1.xx, V2.xx or V3.xx, and AP180-PE with firmware V1.xx, V2.xx or V3.xx. All releases before firmware AP_RGOS 11.9(4)B1P8 are vulnerable.
Risk and Exploitability
The base score of 8.6 indicates high severity. The exploitation probability is very low, with an EPSS score below 1 percent, and the vulnerability is not currently listed in CISA’s Known Exploited Vulnerabilities catalog. The most likely attack vector is remote access via configuration interfaces or management protocols exposed to the network. If an attacker can reach those interfaces, they could inject shell commands using crafted requests, but no public exploit has been disclosed.
OpenCVE Enrichment