Ruijie EG Remote Code Execution Scanner

Detects 'Remote Code Execution' vulnerability in Ruijie EG.

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

10 days 9 hours

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

Ruijie EG is a network device widely used in corporate environments to manage and control network traffic. IT administrators and network engineers deploy Ruijie EG to ensure efficient network management, security, and optimization. The equipment aids in handling bandwidth allocation, user management, and detailed reporting, making it essential in organizations that require stringent network control. Its reliability in performing complex routing and firewall tasks makes it popular across various industries. Ruijie EG integrates several network functions into one platform, providing an easy-to-manage interface that consolidates network operations. These devices are typically deployed in environments that rely heavily on network stability and comprehensive traffic oversight.

Remote Code Execution (RCE) vulnerability allows attackers to execute arbitrary code on a server, gaining control over the affected device. This type of vulnerability can often be exploited by sending crafted requests to exposed interfaces of applications. In the case of Ruijie EG, attackers exploit the cli.php endpoint, leading to compromise without authentication. This vulnerability is critical as it can result in unauthorized administrative access, allowing attackers to manipulate network settings and compromise data integrity. RCE vulnerabilities are particularly dangerous due to the level of access they potentially grant to malicious actors. This weakness requires immediate attention to ensure network integrity and security.

The RCE vulnerability in Ruijie EG is associated with the cli.php endpoint, which is improperly secured, allowing for unauthenticated execution of commands. When a request is sent to this endpoint with specific payloads, the underlying system executes these commands with high privileges. Attackers leverage the weak authentication mechanism to bypass initial login steps and execute arbitrary commands. This exploit allows for listing files, changing configurations, and gaining administrative control of the device. The vulnerability exists due to inadequate input validation and improper session management within the CLI interface.

Exploiting this vulnerability can lead to a total compromise of the Ruijie EG device, allowing attackers full administrative control. Potential effects include unauthorized configuration changes, network outages, data theft, and further spreading of malware throughout the network. Malicious actors can intercept traffic, alter network policies, or introduce persistent backdoors for continuous access. These actions not only compromise the immediate device but can also extend to network users, leading to broader security incidents. The breach could yield control over all network operations managed by the affected Ruijie EG device, endangering overall network security and reliability.

REFERENCES

Get started to protecting your Free Full Security Scan