CVE-2025-46122: n/a
An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, where the authenticated diagnostics API endpoint `/admin/_cmdstat.jsp` passes attacker-controlled input to the shell without adequate validation, enabling a remote attacker to specify a target by MAC address and execute arbitrary commands as root.
AI Analysis
Technical Summary
CVE-2025-46122 is a critical remote command injection vulnerability found in CommScope Ruckus Unleashed wireless access points prior to versions 200.15.6.212.14 and 200.17.7.0.139. The flaw exists in the authenticated diagnostics API endpoint `/admin/_cmdstat.jsp`, which improperly handles attacker-controlled input by passing it directly to the underlying shell without sufficient validation or sanitization. This allows an authenticated attacker to specify a target device by MAC address and execute arbitrary commands with root privileges on the affected device. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating a command injection weakness. The CVSS v3.1 base score is 9.1, reflecting its critical severity, with an attack vector of network (remote), low attack complexity, requiring high privileges (authenticated user), no user interaction, and a scope change that affects confidentiality, integrity, and availability at a high level. Although no public exploits are currently known in the wild, the potential for severe impact is significant given the root-level command execution capability. This vulnerability could be exploited by attackers who have obtained valid credentials or have compromised an account with administrative access to the device's management interface. The affected devices are typically deployed in enterprise and service provider wireless networks, making them attractive targets for attackers seeking to gain persistent footholds or disrupt network operations.
Potential Impact
For European organizations, the impact of CVE-2025-46122 can be substantial. Ruckus Unleashed access points are widely used in enterprise environments, educational institutions, hospitality, and public venues across Europe. Exploitation could lead to full compromise of the wireless infrastructure device, enabling attackers to intercept or manipulate network traffic, deploy malware, pivot to internal networks, or cause denial of service. The root-level access allows attackers to disable security controls, create backdoors, or exfiltrate sensitive data. Given the critical role of wireless access points in providing network connectivity, disruption or compromise could affect business continuity, data confidentiality, and regulatory compliance, especially under GDPR requirements. Additionally, the ability to specify targets by MAC address could allow attackers to selectively attack high-value devices or users. The vulnerability’s requirement for authentication limits exposure to some extent but does not eliminate risk, as credential theft or insider threats remain realistic attack vectors. The lack of known exploits in the wild suggests organizations have a window to remediate before widespread exploitation occurs.
Mitigation Recommendations
Organizations should immediately upgrade affected Ruckus Unleashed devices to versions 200.15.6.212.14, 200.17.7.0.139, or later where the vulnerability has been patched. If upgrading is not immediately possible, restrict access to the management interface to trusted administrators only, ideally via VPN or secure management VLANs. Implement strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Monitor device logs and network traffic for unusual commands or access patterns targeting the `/admin/_cmdstat.jsp` endpoint. Disable or restrict the diagnostics API endpoint if it is not required for operations. Conduct regular audits of user accounts and permissions on the devices to ensure only authorized personnel have administrative access. Network segmentation should be enforced to limit lateral movement if a device is compromised. Finally, maintain an incident response plan that includes wireless infrastructure components to quickly detect and respond to any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-46122: n/a
Description
An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, where the authenticated diagnostics API endpoint `/admin/_cmdstat.jsp` passes attacker-controlled input to the shell without adequate validation, enabling a remote attacker to specify a target by MAC address and execute arbitrary commands as root.
AI-Powered Analysis
Technical Analysis
CVE-2025-46122 is a critical remote command injection vulnerability found in CommScope Ruckus Unleashed wireless access points prior to versions 200.15.6.212.14 and 200.17.7.0.139. The flaw exists in the authenticated diagnostics API endpoint `/admin/_cmdstat.jsp`, which improperly handles attacker-controlled input by passing it directly to the underlying shell without sufficient validation or sanitization. This allows an authenticated attacker to specify a target device by MAC address and execute arbitrary commands with root privileges on the affected device. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating a command injection weakness. The CVSS v3.1 base score is 9.1, reflecting its critical severity, with an attack vector of network (remote), low attack complexity, requiring high privileges (authenticated user), no user interaction, and a scope change that affects confidentiality, integrity, and availability at a high level. Although no public exploits are currently known in the wild, the potential for severe impact is significant given the root-level command execution capability. This vulnerability could be exploited by attackers who have obtained valid credentials or have compromised an account with administrative access to the device's management interface. The affected devices are typically deployed in enterprise and service provider wireless networks, making them attractive targets for attackers seeking to gain persistent footholds or disrupt network operations.
Potential Impact
For European organizations, the impact of CVE-2025-46122 can be substantial. Ruckus Unleashed access points are widely used in enterprise environments, educational institutions, hospitality, and public venues across Europe. Exploitation could lead to full compromise of the wireless infrastructure device, enabling attackers to intercept or manipulate network traffic, deploy malware, pivot to internal networks, or cause denial of service. The root-level access allows attackers to disable security controls, create backdoors, or exfiltrate sensitive data. Given the critical role of wireless access points in providing network connectivity, disruption or compromise could affect business continuity, data confidentiality, and regulatory compliance, especially under GDPR requirements. Additionally, the ability to specify targets by MAC address could allow attackers to selectively attack high-value devices or users. The vulnerability’s requirement for authentication limits exposure to some extent but does not eliminate risk, as credential theft or insider threats remain realistic attack vectors. The lack of known exploits in the wild suggests organizations have a window to remediate before widespread exploitation occurs.
Mitigation Recommendations
Organizations should immediately upgrade affected Ruckus Unleashed devices to versions 200.15.6.212.14, 200.17.7.0.139, or later where the vulnerability has been patched. If upgrading is not immediately possible, restrict access to the management interface to trusted administrators only, ideally via VPN or secure management VLANs. Implement strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Monitor device logs and network traffic for unusual commands or access patterns targeting the `/admin/_cmdstat.jsp` endpoint. Disable or restrict the diagnostics API endpoint if it is not required for operations. Conduct regular audits of user accounts and permissions on the devices to ensure only authorized personnel have administrative access. Network segmentation should be enforced to limit lateral movement if a device is compromised. Finally, maintain an incident response plan that includes wireless infrastructure components to quickly detect and respond to any exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 687e52aea83201eaac106020
Added to database: 7/21/2025, 2:46:06 PM
Last enriched: 7/29/2025, 1:14:04 AM
Last updated: 8/5/2025, 8:26:05 AM
Views: 7
Related Threats
CVE-2025-9053: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9052: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumCVE-2025-9051: SQL Injection in projectworlds Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.