RG - AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networks Co
Description
RG - AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networks Co
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity vulnerability has been identified in the SSH server functionality of multiple Ruijie Networks RG-EST300 devices. This flaw could allow a remote, unauthenticated attacker to bypass security controls and gain unauthorized access to affected systems, potentially leading to a compromise of the network device and the broader internal network.
Vulnerability Details
CVE-ID: CVE-2025-58778
Affected Software: Ruijie Networks RG-EST300
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability exists within the SSH server implementation on the affected Ruijie Networks devices. A flaw in the processing of authentication packets allows a remote, unauthenticated attacker to bypass the authentication mechanism. By sending a specially crafted sequence of SSH packets to a vulnerable device, an attacker can exploit this flaw to gain privileged shell access without providing valid credentials.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.2. Successful exploitation could grant an attacker administrative control over the affected network infrastructure device. This could lead to a complete compromise of the device, allowing the attacker to monitor sensitive network traffic, alter network configurations to redirect data, launch further attacks against the internal network (pivoting), or cause a denial-of-service condition. The potential business impact includes data breaches, significant network downtime, and loss of trust in the organization's security posture.
Remediation Plan
Immediate Action: Apply vendor security updates immediately. After patching, it is critical to monitor for any signs of exploitation attempts and review historical SSH access logs for indicators of compromise that may have occurred prior to remediation.
Proactive Monitoring: Security teams should actively monitor for unusual SSH connection attempts (default TCP port 22) targeting affected devices, especially from untrusted or external IP addresses. Scrutinize SSH logs for anomalous successful logins that do not correlate with legitimate administrative activity. Implement alerts for any unauthorized configuration changes or unexpected system reboots on these devices.
Compensating Controls: If immediate patching is not feasible, restrict SSH access to the devices' management interfaces using strict firewall rules or access control lists (ACLs), permitting connections only from a dedicated and trusted management network. If SSH is not essential for the device's operation, consider disabling the service entirely as a temporary mitigation measure.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of October 17, 2025, there is no known public proof-of-concept exploit code for this vulnerability. However, given the nature of the flaw (authentication bypass on network equipment), it is highly likely that security researchers and threat actors will develop exploit code by reverse-engineering the vendor patch.
Analyst Recommendation
Due to the High severity (CVSS 7.2) of this vulnerability, which allows for remote authentication bypass, immediate action is required. We strongly recommend that all organizations using the affected Ruijie Networks RG-EST300 devices apply the vendor-supplied security patches on an emergency basis. Although this CVE is not currently on the CISA KEV list, the risk of future exploitation is significant. Prioritize patching for all internet-facing devices immediately, followed by internal devices, and implement the recommended compensating controls and monitoring where patching is delayed.