Home

Description

Multiple versions of RG-EST300 provided by Ruijie Networks provide SSH server functionality. It is not documented in the manual, and enabled in the initial configuration. Anyone with the knowledge of the related credentials can log in to the affected device, leading to information disclosure, altering the system configurations, or causing a denial of service (DoS) condition.

PUBLISHED Reserved 2025-09-05 | Published 2025-10-16 | Updated 2025-10-16 | Assigner jpcert




HIGH: 7.2CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

Hidden functionality

Product status

AP_3.0(1)B2P18_EST300_06210514
affected

AP_3.0(1)B2P10_EST300_06151523
affected

AP_3.0(1)B2P10_EST300_05232216
affected

and AP_3.0(1)B2P10_EST300_05220814
affected

References

www.ruijie.com.cn/gy/xw-aqtg-gw/929848/

www.ruijie.com/en-global/support/productLifecycle

jvn.jp/en/jp/JVN72648885/

cve.org (CVE-2025-58778)

nvd.nist.gov (CVE-2025-58778)

Download JSON