Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-36870

Summary
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
Published At-07 Nov, 2025 | 21:52
Updated At-20 Nov, 2025 | 21:32
Rejected At-
Credits

Ruijie Gateway EG & NBR Models v11.1(6)B9P1 - 11.9(4)B12P1 RCE

Various Ruijie Gateway EG and NBR models firmware versions 11.1(6)B9P1 < 11.9(4)B12P1 contain a code execution vulnerability in the EWEB management system that can be abused via front-end functionality. Attackers can exploit front-end code when features such as guest authentication, local server authentication, or screen mirroring are enabled to gain access or execute commands on affected devices. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-02-05 UTC.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:VulnCheck
Assigner Org ID:83251b91-4cc7-4094-a5c7-464a1b83ea10
Published At:07 Nov, 2025 | 21:52
Updated At:20 Nov, 2025 | 21:32
Rejected At:
▼CVE Numbering Authority (CNA)
Ruijie Gateway EG & NBR Models v11.1(6)B9P1 - 11.9(4)B12P1 RCE

Various Ruijie Gateway EG and NBR models firmware versions 11.1(6)B9P1 < 11.9(4)B12P1 contain a code execution vulnerability in the EWEB management system that can be abused via front-end functionality. Attackers can exploit front-end code when features such as guest authentication, local server authentication, or screen mirroring are enabled to gain access or execute commands on affected devices. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-02-05 UTC.

Affected Products
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG1000C
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG2000F
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG2000K
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG2000L
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG2000CE
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG2000SE
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG2000GE
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG2000XE
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG2000UE
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG3000CE
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG3000SE
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG3000GE
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG3000ME
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG3000UE
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG3000XE
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
RG-EG2100-P
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
EG3210
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
EG3220
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
EG3230
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
EG3250
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR108G-P
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR1000G-E
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR1300G-E
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR1700G-E
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR2100G-E
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR2500D-E
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR3000D-E
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR6120-E
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR6135-E
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR6205-E
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR6210-E
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR6215-E
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR800G
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR950G
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR1000G-C
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR2000G-C
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Vendor
Beijing Star-Net Ruijie Network Technology Co., Ltd.
Product
NBR3000G-S
Default Status
unaffected
Versions
Affected
  • From 11.1(6)B9P1 before 11.9(4)B12P1 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-94CWE-94 Improper Control of Generation of Code ('Code Injection')
Type: CWE
CWE ID: CWE-94
Description: CWE-94 Improper Control of Generation of Code ('Code Injection')
Metrics
VersionBase scoreBase severityVector
4.09.2CRITICAL
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 9.2
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-242CAPEC-242 Code Injection
CAPEC ID: CAPEC-242
Description: CAPEC-242 Code Injection
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Ruijie Networks publicly discloses technical details of vulnerability.2020-05-07 16:00:00
Ruijie Networks publicly acknowledges exploitation in the wild activity.2021-01-21 17:00:00
CNVD-2021-09650 is published.2021-03-11 17:00:00
Event: Ruijie Networks publicly discloses technical details of vulnerability.
Date: 2020-05-07 16:00:00
Event: Ruijie Networks publicly acknowledges exploitation in the wild activity.
Date: 2021-01-21 17:00:00
Event: CNVD-2021-09650 is published.
Date: 2021-03-11 17:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.ruijie.com.cn/gy/xw-aqtg-zw/85638/
vendor-advisory
patch
https://www.ruijie.com.cn/gy/xw-aqtg-gw/86747/
vendor-advisory
patch
https://www.cnvd.org.cn/flaw/show/CNVD-2021-09650
government-resource
third-party-advisory
https://www.vulncheck.com/advisories/ruijie-networks-eg-and-nbr-series-routers-rce
third-party-advisory
Hyperlink: https://www.ruijie.com.cn/gy/xw-aqtg-zw/85638/
Resource:
vendor-advisory
patch
Hyperlink: https://www.ruijie.com.cn/gy/xw-aqtg-gw/86747/
Resource:
vendor-advisory
patch
Hyperlink: https://www.cnvd.org.cn/flaw/show/CNVD-2021-09650
Resource:
government-resource
third-party-advisory
Hyperlink: https://www.vulncheck.com/advisories/ruijie-networks-eg-and-nbr-series-routers-rce
Resource:
third-party-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:disclosure@vulncheck.com
Published At:07 Nov, 2025 | 22:15
Updated At:20 Nov, 2025 | 22:15

Various Ruijie Gateway EG and NBR models firmware versions 11.1(6)B9P1 < 11.9(4)B12P1 contain a code execution vulnerability in the EWEB management system that can be abused via front-end functionality. Attackers can exploit front-end code when features such as guest authentication, local server authentication, or screen mirroring are enabled to gain access or execute commands on affected devices. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-02-05 UTC.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.09.2CRITICAL
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 4.0
Base score: 9.2
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-94Secondarydisclosure@vulncheck.com
CWE ID: CWE-94
Type: Secondary
Source: disclosure@vulncheck.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.cnvd.org.cn/flaw/show/CNVD-2021-09650disclosure@vulncheck.com
N/A
https://www.ruijie.com.cn/gy/xw-aqtg-gw/86747/disclosure@vulncheck.com
N/A
https://www.ruijie.com.cn/gy/xw-aqtg-zw/85638/disclosure@vulncheck.com
N/A
https://www.vulncheck.com/advisories/ruijie-networks-eg-and-nbr-series-routers-rcedisclosure@vulncheck.com
N/A
Hyperlink: https://www.cnvd.org.cn/flaw/show/CNVD-2021-09650
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://www.ruijie.com.cn/gy/xw-aqtg-gw/86747/
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://www.ruijie.com.cn/gy/xw-aqtg-zw/85638/
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://www.vulncheck.com/advisories/ruijie-networks-eg-and-nbr-series-routers-rce
Source: disclosure@vulncheck.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1Records found

CVE-2025-24293
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-9.2||CRITICAL
EPSS-0.17% / 37.88%
||
7 Day CHG~0.00%
Published-30 Jan, 2026 | 20:11
Updated-04 Feb, 2026 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

# Active Storage allowed transformation methods potentially unsafe Active Storage attempts to prevent the use of potentially unsafe image transformation methods and parameters by default. The default allowed list contains three methods allow for the circumvention of the safe defaults which enables potential command injection vulnerabilities in cases where arbitrary user supplied input is accepted as valid transformation methods or parameters. Impact ------ This vulnerability impacts applications that use Active Storage with the image_processing processing gem in addition to mini_magick as the image processor. Vulnerable code will look something similar to this: ``` <%= image_tag blob.variant(params[:t] => params[:v]) %> ``` Where the transformation method or its arguments are untrusted arbitrary input. All users running an affected release should either upgrade or use one of the workarounds immediately. Workarounds ----------- Consuming user supplied input for image transformation methods or their parameters is unsupported behavior and should be considered dangerous. Strict validation of user supplied methods and parameters should be performed as well as having a strong [ImageMagick security policy](https://imagemagick.org/script/security-policy.php) deployed. Credits ------- Thank you [lio346](https://hackerone.com/lio346) for reporting this!

Action-Not Available
Vendor-Ruby on Rails
Product-activestorage
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
Details not found