Wednesday, February 26, 2025
HomeCVE/vulnerabilityReyee OS IoT Devices Compromised: Over-The-Air Attack Bypasses Wi-Fi Logins

Reyee OS IoT Devices Compromised: Over-The-Air Attack Bypasses Wi-Fi Logins

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered multiple vulnerabilities in Ruijie Networks’ cloud-connected devices. By exploiting these vulnerabilities, attackers can remotely compromise access points, gain unauthorized access to internal networks, and execute arbitrary code on affected devices. 

The “Open Sesame” attack demonstrates a practical scenario where an attacker can leverage physical proximity to a Ruijie Reyee OS access point to steal identifiers, compromise the device through the cloud, and ultimately gain remote control over it. 

An airport with an access point made by Ruijie – used for WiFi network access.

Ruijie Networks is a global provider of networking solutions, including switches, access points, and cloud services, as researchers focused on Ruijie’s Reyee cloud platform as a potential attack vector for remotely compromising devices.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

By exploiting vulnerabilities in the cloud platform, attackers could gain unauthorized access to devices like access points, even if they are behind firewalls and NAT devices, highlighting the importance of securing cloud-based management platforms to protect connected devices from remote attacks.

network architecture of the attack

Ruijie’s cloud-based management portal allows remote device management and configuration, where devices connect to the cloud via serial number pairing and are claimed by registered users. 

Firmware updates are downloaded from Ruijie’s website but are encrypted and by exploiting a device vulnerability, researchers obtained the decryption binary rg-upgrade-crypto. 

Through the use of QEMU emulation, they carried out the binary in order to decrypt the firmware, which resulted in the illumination of its internal structure, which included the Linux kernel and the root filesystem.

The Ruijie firmware download page.

The serial number of the device is used to generate its MQTT credentials, which are then used by Ruijie devices to communicate with the cloud using MQTT. 

By reverse-engineering the firmware, it was discovered that the credential generation process allows users to authenticate to the MQTT broker using leaked serial numbers, as this vulnerability, CVE-2024-45722, compromises device security and enables unauthorized access to the cloud. 

A script connecting to Ruijie’s MQTT broker.

A critical vulnerability was exposed by Ruijie’s MQTT broker, which allowed unauthorized access to sensitive device information. 

By exploiting wildcard subscriptions, attackers could intercept messages sent to and from devices, including device serial numbers and cloud-issued commands, which enabled attackers to impersonate the cloud, execute arbitrary code on any connected device, and potentially compromise entire networks.

A sample from a list of tens of thousands of Ruijie device serial numbers.

Team82 discovered a vulnerability in Ruijie access points that allows attackers to remotely execute code on the device and by sniffing Wi-Fi beacons, attackers can obtain the device’s serial number. 

Leveraging vulnerabilities in Ruijie’s MQTT communication, attackers can impersonate the cloud and send malicious commands to the target device, gaining remote access to the internal network. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...