Various Ruijie Gateway EG and NBR models firmware versions 11.1(6)B9P1 < 11.9(4)B12P1 contain a code execution vulnerability in the EWEB management system that can be abused via front-end functionality. Attackers can exploit front-end code when features such as guest authentication, local server authentication, or screen mirroring are enabled to gain access or execute commands on affected devices. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-06-07 UTC.
History

Mon, 10 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Ruijie
Ruijie eg3210
Ruijie eg3220
Ruijie eg3230
Ruijie eg3250
Ruijie nbr1000g-c
Ruijie nbr1000g-e
Ruijie nbr108g-p
Ruijie nbr1300g-e
Ruijie nbr1700g-e
Ruijie nbr2000g-c
Ruijie nbr2100g-e
Ruijie nbr2500d-e
Ruijie nbr3000d-e
Ruijie nbr3000g-s
Ruijie nbr6120-e
Ruijie nbr6135-e
Ruijie nbr6205-e
Ruijie nbr6210-e
Ruijie nbr6215-e
Ruijie nbr800g
Ruijie nbr950g
Ruijie rg-eg1000c
Ruijie rg-eg2000ce
Ruijie rg-eg2000f
Ruijie rg-eg2000ge
Ruijie rg-eg2000k
Ruijie rg-eg2000l
Ruijie rg-eg2000se
Ruijie rg-eg2000ue
Ruijie rg-eg2000xe
Ruijie rg-eg2100-p
Ruijie rg-eg3000ce
Ruijie rg-eg3000ge
Ruijie rg-eg3000me
Ruijie rg-eg3000se
Ruijie rg-eg3000ue
Ruijie rg-eg3000xe
Vendors & Products Ruijie
Ruijie eg3210
Ruijie eg3220
Ruijie eg3230
Ruijie eg3250
Ruijie nbr1000g-c
Ruijie nbr1000g-e
Ruijie nbr108g-p
Ruijie nbr1300g-e
Ruijie nbr1700g-e
Ruijie nbr2000g-c
Ruijie nbr2100g-e
Ruijie nbr2500d-e
Ruijie nbr3000d-e
Ruijie nbr3000g-s
Ruijie nbr6120-e
Ruijie nbr6135-e
Ruijie nbr6205-e
Ruijie nbr6210-e
Ruijie nbr6215-e
Ruijie nbr800g
Ruijie nbr950g
Ruijie rg-eg1000c
Ruijie rg-eg2000ce
Ruijie rg-eg2000f
Ruijie rg-eg2000ge
Ruijie rg-eg2000k
Ruijie rg-eg2000l
Ruijie rg-eg2000se
Ruijie rg-eg2000ue
Ruijie rg-eg2000xe
Ruijie rg-eg2100-p
Ruijie rg-eg3000ce
Ruijie rg-eg3000ge
Ruijie rg-eg3000me
Ruijie rg-eg3000se
Ruijie rg-eg3000ue
Ruijie rg-eg3000xe

Fri, 07 Nov 2025 22:00:00 +0000

Type Values Removed Values Added
Description Various Ruijie Gateway EG and NBR models firmware versions 11.1(6)B9P1 < 11.9(4)B12P1 contain a code execution vulnerability in the EWEB management system that can be abused via front-end functionality. Attackers can exploit front-end code when features such as guest authentication, local server authentication, or screen mirroring are enabled to gain access or execute commands on affected devices. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-06-07 UTC.
Title Ruijie Gateway EG & NBR Models v11.1(6)B9P1 - 11.9(4)B12P1 RCE
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-11-07T21:52:55.227Z

Updated: 2025-11-07T21:52:55.227Z

Reserved: 2025-10-30T15:45:57.762Z

Link: CVE-2020-36870

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-07T22:15:38.587

Modified: 2025-11-07T22:15:38.587

Link: CVE-2020-36870

cve-icon Redhat

No data.