CVE-2023-25717

CRITICAL KEV NUCLEI

Ruckuswireless Ruckus Wireless Admin < 10.4 - Code Injection

Title source: rule

Description

Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.

Nuclei Templates (1)

Ruckus Wireless Admin - Remote Code Execution
CRITICALVERIFIEDby parthmalhotra,pdresearch
Shodan: title:"ruckus wireless" || http.title:"ruckus wireless"
FOFA: title="ruckus wireless"

Scores

CVSS v3 9.8
EPSS 0.9424
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2023-05-12
VulnCheck KEV 2023-05-08
InTheWild.io 2023-05-12
ENISA EUVD EUVD-2023-29627
CWE
CWE-94
Status published
Products (4)
commscope/ruckus_smartzone_firmware 6.1.0.0.935
commscope/ruckus_smartzone_firmware < 5.2.1.3
ruckuswireless/ruckus_wireless_admin < 10.4
ruckuswireless/smartzone_ap < 6.1.0.0.9240
Published Feb 13, 2023
KEV Added May 12, 2023
Tracked Since Feb 18, 2026