CVE-2025-56092

OS Command Injection vulnerability in Ruijie X30 PRO V1 X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ruijie:rg-ew300t_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-ew300t:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:ruijie:x30_pro_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:x30_pro:1.0:*:*:*:*:*:*:*

History

29 Jan 2026, 14:51

Type Values Removed Values Added
CPE cpe:2.3:h:ruijie:rg-ew300t:-:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:rg-ew300t_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:x30_pro_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:x30_pro:1.0:*:*:*:*:*:*:*
References () https://1drv.ms/f/c/12406a392c92914b/EtGIxwWujwxBvQhL9wgnUIwBkg-mndJJX07Igr6d0cic-g?e=4KJbWY - () https://1drv.ms/f/c/12406a392c92914b/EtGIxwWujwxBvQhL9wgnUIwBkg-mndJJX07Igr6d0cic-g?e=4KJbWY - Broken Link, Exploit
References () https://1drv.ms/t/c/12406a392c92914b/EaD98URfTfFKm1v_MTfU-UEBUxRf5vj3O0x7fhabn5_l9A?e=BuNPV9 - () https://1drv.ms/t/c/12406a392c92914b/EaD98URfTfFKm1v_MTfU-UEBUxRf5vj3O0x7fhabn5_l9A?e=BuNPV9 - Broken Link, Exploit
References () https://github.com/flegoity/Ruijie-Multiple-Devices-Vulnerability-Reports-for-CVE/blob/main/CVE-2025-56091.md - () https://github.com/flegoity/Ruijie-Multiple-Devices-Vulnerability-Reports-for-CVE/blob/main/CVE-2025-56091.md - Not Applicable
First Time Ruijie rg-ew300t Firmware
Ruijie x30 Pro Firmware
Ruijie x30 Pro
Ruijie
Ruijie rg-ew300t

12 Dec 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-78

11 Dec 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-11 19:15

Updated : 2026-01-29 14:51


NVD link : CVE-2025-56092

Mitre link : CVE-2025-56092

CVE.ORG link : CVE-2025-56092


JSON object : View

Products Affected

ruijie

  • x30_pro_firmware
  • rg-ew300t
  • x30_pro
  • rg-ew300t_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')