OS Command Injection vulnerability in Ruijie RG-YST AP_3.0(1)B11P280YST250F allowing attackers to execute arbitrary commands via a crafted POST request to the pwdmodify in file /usr/lib/lua/luci/modules/common.lua.
References
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-11 19:15
Updated : 2026-02-11 19:39
NVD link : CVE-2025-56099
Mitre link : CVE-2025-56099
CVE.ORG link : CVE-2025-56099
JSON object : View
Products Affected
ruijie
- rg-ew300_pro
- rg-est350_v2
- reyee_os
- rg-yst250f_firmware
- rg-eap602_firmware
- rg-est310_v2
- rg-est310_v2_firmware
- rg-eap602
- rg-yst250f
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
