JVN#72648885
Ruijie Networks RG-EST300 undocumented SSH functionality
Overview
RG-EST300 provided by Ruijie Networks provides undocumented SSH server functionality, which is enabled in the initial configuration.
Products Affected
- RG-EST300
- AP_3.0(1)B2P18_EST300_06210514
- AP_3.0(1)B2P10_EST300_06151523
- AP_3.0(1)B2P10_EST300_05232216
- AP_3.0(1)B2P10_EST300_05220814
Description
RG-EST300 provided by Ruijie Networks provides SSH server functionality. It is not documented in the manual, and enabled in the initial configuration.
- Hidden functionality (CWE-912)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 8.6
- CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score 7.2
- CVE-2025-58778
Impact
Anyone with the knowledge of the related credentials can log in to the affected device, leading to information disclosure, altering the system configurations, or causing a denial of service (DoS) condition.
Solution
Stop using the products
Affected products are no longer supported. It is strongly recommended that users discontinue their use and switch to supported alternatives.
For more information, refer to the information provided by the developer.
Vendor Status
Vendor | Link |
Ruijie Networks Co., Ltd. | 锐捷睿易网桥EST300存在安全漏洞 (Text in Simplified Chinese) |
Product Life Cycle Policy |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Ryu Kuki, Iwaki Miyamoto, Takayuki Sasaki, Katsunari Yoshioka of Yokohama National University reported this vulnerability to the developer and coordinated. After the coordination was completed, they reported the case to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2025-58778 |
JVN iPedia |
JVNDB-2025-000087 |