Home

Description

Various Ruijie Gateway EG and NBR models firmware versions 11.1(6)B9P1 < 11.9(4)B12P1 contain a code execution vulnerability in the EWEB management system that can be abused via front-end functionality. Attackers can exploit front-end code when features such as guest authentication, local server authentication, or screen mirroring are enabled to gain access or execute commands on affected devices. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-06-07 UTC.

PUBLISHED Reserved 2025-10-30 | Published 2025-11-07 | Updated 2025-11-07 | Assigner VulnCheck




CRITICAL: 9.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Default status
unaffected

11.1(6)B9P1 (custom) before 11.9(4)B12P1
affected

Timeline

2020-05-07:Ruijie Networks publicly discloses technical details of vulnerability.
2021-01-21:Ruijie Networks publicly acknowledges exploitation in the wild activity.
2021-03-11:CNVD-2021-09650 is published.

References

www.ruijie.com.cn/gy/xw-aqtg-zw/85638/ vendor-advisory patch

www.ruijie.com.cn/gy/xw-aqtg-gw/86747/ vendor-advisory patch

www.cnvd.org.cn/flaw/show/CNVD-2021-09650 government-resource third-party-advisory

www.vulncheck.com/...-networks-eg-and-nbr-series-routers-rce third-party-advisory

cve.org (CVE-2020-36870)

nvd.nist.gov (CVE-2020-36870)

Download JSON