OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.
References
| Link | Resource |
|---|---|
| https://1drv.ms/f/c/12406a392c92914b/EtGIxwWujwxBvQhL9wgnUIwBkg-mndJJX07Igr6d0cic-g?e=4KJbWY | Broken Link Exploit |
| https://1drv.ms/t/c/12406a392c92914b/EYC9-EvSxKZOum9kuAtPDq4BjKb0c8IV6B52lDEAD33pEA?e=2C0BKO | Broken Link Exploit |
| https://github.com/flegoity/Ruijie-Multiple-Devices-Vulnerability-Reports-for-CVE/blob/main/CVE-2025-56098.md | Exploit Third Party Advisory |
Configurations
History
27 Jan 2026, 17:58
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:ruijie:x30_pro:1.0:*:*:*:*:*:*:* cpe:2.3:o:ruijie:x30_pro_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:ruijie:rg-ew300_pro:-:*:*:*:*:*:*:* cpe:2.3:o:ruijie:rg-ew300_pro_firmware:3.0\(1\)b11p219:*:*:*:*:*:*:* |
|
| First Time |
Ruijie x30 Pro
Ruijie x30 Pro Firmware Ruijie Ruijie rg-ew300 Pro Firmware Ruijie rg-ew300 Pro |
|
| References | () https://1drv.ms/f/c/12406a392c92914b/EtGIxwWujwxBvQhL9wgnUIwBkg-mndJJX07Igr6d0cic-g?e=4KJbWY - Broken Link, Exploit | |
| References | () https://1drv.ms/t/c/12406a392c92914b/EYC9-EvSxKZOum9kuAtPDq4BjKb0c8IV6B52lDEAD33pEA?e=2C0BKO - Broken Link, Exploit | |
| References | () https://github.com/flegoity/Ruijie-Multiple-Devices-Vulnerability-Reports-for-CVE/blob/main/CVE-2025-56098.md - Exploit, Third Party Advisory |
12 Dec 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-78 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
11 Dec 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 19:15
Updated : 2026-01-27 17:58
NVD link : CVE-2025-56098
Mitre link : CVE-2025-56098
CVE.ORG link : CVE-2025-56098
JSON object : View
Products Affected
ruijie
- x30_pro_firmware
- rg-ew300_pro_firmware
- rg-ew300_pro
- x30_pro
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
