Description
OS Command Injection vulnerability in Ruijie RG-YST AP_3.0(1)B11P280YST250F allowing attackers to execute arbitrary commands via a crafted POST request to the pwdmodify in file /usr/lib/lua/luci/modules/common.lua.
Published: 2025-12-11
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Ruijie reyee Os
Ruijie rg-eap602
Ruijie rg-eap602 Firmware
Ruijie rg-est310 V2
Ruijie rg-est310 V2 Firmware
Ruijie rg-est350 V2
Ruijie rg-ew300 Pro
Ruijie rg-yst250f
Ruijie rg-yst250f Firmware
CPEs cpe:2.3:h:ruijie:rg-eap602:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-est310_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-est350_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-ew300_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:ruijie:rg-yst250f:-:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:reyee_os:219:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:reyee_os:221:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:rg-eap602_firmware:3.0\(1\)b2p55:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:rg-est310_v2_firmware:b11p221:*:*:*:*:*:*:*
cpe:2.3:o:ruijie:rg-yst250f_firmware:3.0\(1\)b11p280yst250f:*:*:*:*:*:*:*
Vendors & Products Ruijie reyee Os
Ruijie rg-eap602
Ruijie rg-eap602 Firmware
Ruijie rg-est310 V2
Ruijie rg-est310 V2 Firmware
Ruijie rg-est350 V2
Ruijie rg-ew300 Pro
Ruijie rg-yst250f
Ruijie rg-yst250f Firmware

Fri, 12 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-78
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Ruijie
Ruijie rg-yst Ap
Vendors & Products Ruijie
Ruijie rg-yst Ap

Thu, 11 Dec 2025 18:45:00 +0000

Type Values Removed Values Added
Description OS Command Injection vulnerability in Ruijie RG-YST AP_3.0(1)B11P280YST250F allowing attackers to execute arbitrary commands via a crafted POST request to the pwdmodify in file /usr/lib/lua/luci/modules/common.lua.
References

Subscriptions

Ruijie Reyee Os Rg-eap602 Rg-eap602 Firmware Rg-est310 V2 Rg-est310 V2 Firmware Rg-est350 V2 Rg-ew300 Pro Rg-yst250f Rg-yst250f Firmware Rg-yst Ap
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-12T17:35:47.324Z

Reserved: 2025-08-16T00:00:00.000Z

Link: CVE-2025-56099

cve-icon Vulnrichment

Updated: 2025-12-12T17:31:29.704Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-11T19:15:55.860

Modified: 2026-02-11T19:39:26.010

Link: CVE-2025-56099

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-12T08:49:57Z

Weaknesses