TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2025-44961

CRITICAL
9.9

Beschreibung

In RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build, OS command injection can occur via an IP address field provided by an authenticated user.

CVE Details

CVSS v3.1 Bewertung9.9
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht8/4/2025
Zuletzt geandert11/3/2025
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

commscope:ruckus_c110commscope:ruckus_e510commscope:ruckus_h320commscope:ruckus_h350commscope:ruckus_h510commscope:ruckus_m510commscope:ruckus_network_directorcommscope:ruckus_r320commscope:ruckus_r510commscope:ruckus_r560commscope:ruckus_r610commscope:ruckus_r710commscope:ruckus_r720commscope:ruckus_r730commscope:ruckus_r750commscope:ruckus_smartzone_100commscope:ruckus_smartzone_100-dcommscope:ruckus_smartzone_144commscope:ruckus_smartzone_144-federalcommscope:ruckus_smartzone_300commscope:ruckus_smartzone_300-federalcommscope:ruckus_smartzone_firmwarecommscope:ruckus_t310ccommscope:ruckus_t310dcommscope:ruckus_t310ncommscope:ruckus_t310scommscope:ruckus_t350secommscope:ruckus_t750commscope:ruckus_t750secommscope:ruckus_virtual_smartzonecommscope:ruckus_virtual_smartzone-federal

Schwachen (CWE)

CWE-78

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.