Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Aug 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Commscope
Commscope ruckus Smartzone Firmware |
|
CPEs | cpe:2.3:o:ruckuswireless:smartzone:6.1.0.0.935:*:*:*:*:*:*:* |
cpe:2.3:o:commscope:ruckus_smartzone_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.0.0.935:*:*:*:*:*:*:* |
Vendors & Products |
Ruckuswireless smartzone
|
Commscope
Commscope ruckus Smartzone Firmware |
Wed, 29 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|

Status: PUBLISHED
Assigner: mitre
Published: 2023-02-13T00:00:00.000Z
Updated: 2025-07-30T01:37:31.539Z
Reserved: 2023-02-13T00:00:00.000Z
Link: CVE-2023-25717

Updated: 2024-08-02T11:32:11.415Z

Status : Analyzed
Published: 2023-02-13T20:15:10.973
Modified: 2025-08-22T21:09:15.577
Link: CVE-2023-25717

No data.