1. Overview

Certain versions of the RG-EG and RG-NBR series contain an unauthorized web access vulnerability. An attacker who successfully exploits this vulnerability may be able to obtain unauthorized administrative access to the affected device.

2. Software Versions and Fixes

Affected Product

Affected Version

Fix Version

RG-NBR6120-E

NBR_RGOS 11.1(6)B2, Release(03140210) to NBR_RGOS11.9 (6) B17P3 Release(13162101) (exclusive)

NBR_RGOS11.9 (6) B17P3 Release(13162101) and later versions

RG-NBR6205-E

 

NBR_RGOS 11.1(6)B2, Release(03140210) to NBR_RGOS11.9 (6) B17P3 Release(13162107) (exclusive)

NBR_RGOS11.9 (6) B17P3 Release(13162107) and later versions

RG-NBR6210-E

NBR_RGOS 11.1(6)B2, Release(03140210) to NBR_RGOS11.9 (6) B17P3 Release(13162107) (exclusive)

NBR_RGOS11.9 (6) B17P3 Release(13162107) and later versions

RG-NBR6215-E

 

NBR_RGOS 11.1(6)B2, Release(03140210) to NBR_RGOS11.9 (6) B17P3 Release(13162107) (exclusive)

NBR_RGOS11.9 (6) B17P3 Release(13162107) and later versions

RG-EG2100-P

EG_RGOS 11.1(1)B1P1, Release(03171315) to EG_RGOS11.9 (6) B17P3 Release(13162100) (exclusive)

EG_RGOS11.9 (6) B17P3 Release(13162100) and later versions

RG-EG3000XE, RG-EG3000UE

EG_RGOS 11.1(1)B1P1, Release(03171315) to EG_RGOS11.9 (6) B17P3 Release(13162103) (exclusive)

EG_RGOS11.9 (6) B17P3 Release(13162103) and later versions

RG-EG3230

EG_RGOS 11.1(1)B1P1, Release(03171315) to EG_RGOS11.9 (6) B17P3 Release(13162107) (exclusive)

EG_RGOS11.9 (6) B17P3 Release(13162107) and later versions

RG-EG3250

EG_RGOS 11.1(1)B1P1, Release(03171315) to EG_RGOS11.9 (6) B17P3 Release(13162107) (exclusive)

EG_RGOS11.9 (6) B17P3 Release(13162107) and later versions

Obtaining the fix versions:

  1. The products that support automatic updates will receive a system update prompt. You can install the update to fix the vulnerability.
  2. Download it from the Ruijie Networks websites.
  3. Contact local after-sales personnel to obtain it.

3. Vulnerability Scoring

https://www.first.org/cvss/v3.1/specification-document

Base Score: 7.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

4. Workaround

N/A

5. Source

The vulnerability was discovered by Ruijie internal testers.

6. Revision History

Date

Revision History

2026-04-23

Initial release

7. Contact Us

Ruijie Networks is committed to protecting the best interests of users, adheres to the principle of responsible disclosure, and deals with product security issues through our response mechanism.