Summary

The command injection vulnerability exists on certain RG-EW series devices after authorization. An attacker can inject and execute commands after obtaining the eWeb login credentials.

Internal vulnerability ID: PSIRT-2025-10310

External vulnerability ID: CVE-2025-11073,NVDB-TEMP-CNVDB-2025399731

Software Versions and Fixes

Product Series

Affected Product

Affected Version

Repair Versions

RG-EW series

RG-M18

RG-R4

RG-E6

RG-E5

RG-M32

RG-R6

RG-EW1800GX-PRO

RG-EW1200R

RG-REX12

RG-EW1200G PRO

RG-EW300 PRO

RG-EW300N

RG-EW1200

RG-EW3200GX PRO

RG-EW300R

RG-EW6000GX

RG-EW7200BE-PRO

RG-EW300T

RG-EW1300G

RG-EW3000GX

RG-EW3000GX-PRO

RG-E4

Earlier versions than EW_3.0(1)B11P380

EW_3.0(1)B11P380 or later

 

Obtaining Fixed Software:

  1. The product that supports automatic update will receive a system update prompt. You can install the update to fix the vulnerability.
  2. Download it from Ruijie Networks websites.
  3. Contact local after-sales personnel to obtain it.

Vulnerability Scoring

Vulnerabilities are scored based on the CVSS v3.1 scoring system. For details, please refer to: https://www.first.org/cvss/v3.1/specification-document.

Base Score: 4.7

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Temporary Fix

  1. To enhance password strength, users are advised to configure a password that contains more than 12 characters from at least three of the following classes: uppercase letters, lowercase letters, digits, and special characters.
  2. You are advised not to expose the eWeb ports to the Internet unless necessary.

Source

This vulnerability was reported by Sheep from the ROIS team of Fuzhou University.

Revision History

Date

Revision History

2025-11-11

V1.0 Initial Release

Contact Us

Ruijie Networks adheres to protecting the ultimate interests of users with best efforts and the principle of responsible disclosure and deals with product security issues through our response mechanism.

To enjoy Ruijie Networks PSIRT services and obtain Ruijie Networks product vulnerability information, please visit https://www.ruijienetworks.com/support/securityBulletins.

To report a security vulnerability in Ruijie Networks products and solutions, please send it to PSIRT@ruijie.com.cn. For details, please visit https://www.ruijienetworks.com/support/securityBulletins/vulnerability_reporting.

You can contact us through the following channels:

  1. Support: https://www.ruijienetworks.com/support
  2. Community: https://community.ruijienetworks.com/portal.php
  3. Live Chat: https://www.ruijienetworks.com/rita