IRZ RUH2 3G Firmware Overwrite Vulnerability (Update A)
The IRZ RUH2 3G gateway is vulnerable to firmware overwrite attacks. An authenticated attacker with high-level credentials can upload and install arbitrary firmware to the device without proper integrity or authenticity verification. This affects all versions of the RUH2 firmware. The vendor has not released a patch and does not plan to fix this vulnerability. The RUH2 is commonly deployed as a remote monitoring gateway in industrial control systems and utilities, making unauthorized firmware modification a significant threat to operational continuity and device integrity.
- Administrative or engineering-level credentials on the RUH2 device
- Network access to the RUH2 management interface (typically Ethernet or serial console)
- Ability to craft or host a malicious firmware file compatible with RUH2
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7449b1e3-ad93-456f-b41e-bdfc78464dd2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.