CVE-2025-46123: n/a
An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where the authenticated configuration endpoint `/admin/_conf.jsp` writes the Wi-Fi guest password to memory with snprintf using the attacker-supplied value as the format string; a crafted password therefore triggers uncontrolled format-string processing and enables remote code execution on the controller.
AI Analysis
Technical Summary
CVE-2025-46123 is a high-severity vulnerability affecting CommScope Ruckus Unleashed wireless controllers prior to versions 200.15.6.212.14 and 200.17.7.0.139, as well as Ruckus ZoneDirector controllers prior to version 10.5.1.0.279. The vulnerability arises from improper handling of the Wi-Fi guest password in the authenticated configuration endpoint `/admin/_conf.jsp`. Specifically, the endpoint uses the C function snprintf to write the guest password to memory, but it incorrectly uses the attacker-supplied password as the format string. This results in an uncontrolled format string vulnerability (CWE-134), which can be exploited to execute arbitrary code remotely on the controller. The attacker must have authenticated access to the configuration interface, but no user interaction beyond that is required. Exploitation could allow an attacker to gain full control over the wireless controller, potentially leading to compromise of the network infrastructure managed by the device. The vulnerability has a CVSS v3.1 base score of 7.2, reflecting its high impact on confidentiality, integrity, and availability due to remote code execution capabilities. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and should be considered a significant risk to affected deployments. No official patches or mitigation links are provided in the data, indicating that organizations must monitor vendor advisories closely for updates or apply workarounds where possible.
Potential Impact
For European organizations, this vulnerability poses a serious risk to the security and stability of their wireless network infrastructure. Ruckus wireless controllers are commonly used in enterprise, education, hospitality, and public sector environments across Europe. Successful exploitation could allow attackers to execute arbitrary code on the controller, leading to unauthorized access to network management functions, interception or manipulation of network traffic, and potential lateral movement within the corporate network. This could result in data breaches, disruption of wireless services, and compromise of sensitive information. Given the authenticated access requirement, insider threats or compromised credentials could be leveraged to exploit this vulnerability. The impact is heightened in critical infrastructure sectors and organizations with large-scale wireless deployments, where network availability and integrity are paramount. Additionally, the vulnerability could be exploited as a foothold for further attacks against European organizations, especially those with strategic importance or handling sensitive data.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately verify if their Ruckus Unleashed or ZoneDirector controllers are running affected versions and prioritize upgrading to the fixed versions once released by CommScope. 2) Restrict access to the administrative interface `/admin/_conf.jsp` by implementing strong network segmentation, limiting management access to trusted IP addresses, and enforcing multi-factor authentication for all administrative accounts. 3) Regularly audit and rotate administrative credentials to reduce the risk of credential compromise. 4) Monitor network and device logs for unusual activity indicative of exploitation attempts, such as unexpected format string anomalies or unauthorized configuration changes. 5) If patches are not yet available, consider temporarily disabling guest Wi-Fi functionality or restricting guest password changes until a fix is applied. 6) Employ intrusion detection/prevention systems capable of detecting format string exploitation patterns targeting these controllers. 7) Maintain an up-to-date asset inventory and vulnerability management process to ensure timely identification and remediation of such vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-46123: n/a
Description
An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where the authenticated configuration endpoint `/admin/_conf.jsp` writes the Wi-Fi guest password to memory with snprintf using the attacker-supplied value as the format string; a crafted password therefore triggers uncontrolled format-string processing and enables remote code execution on the controller.
AI-Powered Analysis
Technical Analysis
CVE-2025-46123 is a high-severity vulnerability affecting CommScope Ruckus Unleashed wireless controllers prior to versions 200.15.6.212.14 and 200.17.7.0.139, as well as Ruckus ZoneDirector controllers prior to version 10.5.1.0.279. The vulnerability arises from improper handling of the Wi-Fi guest password in the authenticated configuration endpoint `/admin/_conf.jsp`. Specifically, the endpoint uses the C function snprintf to write the guest password to memory, but it incorrectly uses the attacker-supplied password as the format string. This results in an uncontrolled format string vulnerability (CWE-134), which can be exploited to execute arbitrary code remotely on the controller. The attacker must have authenticated access to the configuration interface, but no user interaction beyond that is required. Exploitation could allow an attacker to gain full control over the wireless controller, potentially leading to compromise of the network infrastructure managed by the device. The vulnerability has a CVSS v3.1 base score of 7.2, reflecting its high impact on confidentiality, integrity, and availability due to remote code execution capabilities. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and should be considered a significant risk to affected deployments. No official patches or mitigation links are provided in the data, indicating that organizations must monitor vendor advisories closely for updates or apply workarounds where possible.
Potential Impact
For European organizations, this vulnerability poses a serious risk to the security and stability of their wireless network infrastructure. Ruckus wireless controllers are commonly used in enterprise, education, hospitality, and public sector environments across Europe. Successful exploitation could allow attackers to execute arbitrary code on the controller, leading to unauthorized access to network management functions, interception or manipulation of network traffic, and potential lateral movement within the corporate network. This could result in data breaches, disruption of wireless services, and compromise of sensitive information. Given the authenticated access requirement, insider threats or compromised credentials could be leveraged to exploit this vulnerability. The impact is heightened in critical infrastructure sectors and organizations with large-scale wireless deployments, where network availability and integrity are paramount. Additionally, the vulnerability could be exploited as a foothold for further attacks against European organizations, especially those with strategic importance or handling sensitive data.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately verify if their Ruckus Unleashed or ZoneDirector controllers are running affected versions and prioritize upgrading to the fixed versions once released by CommScope. 2) Restrict access to the administrative interface `/admin/_conf.jsp` by implementing strong network segmentation, limiting management access to trusted IP addresses, and enforcing multi-factor authentication for all administrative accounts. 3) Regularly audit and rotate administrative credentials to reduce the risk of credential compromise. 4) Monitor network and device logs for unusual activity indicative of exploitation attempts, such as unexpected format string anomalies or unauthorized configuration changes. 5) If patches are not yet available, consider temporarily disabling guest Wi-Fi functionality or restricting guest password changes until a fix is applied. 6) Employ intrusion detection/prevention systems capable of detecting format string exploitation patterns targeting these controllers. 7) Maintain an up-to-date asset inventory and vulnerability management process to ensure timely identification and remediation of such vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 687e52aea83201eaac106025
Added to database: 7/21/2025, 2:46:06 PM
Last enriched: 7/29/2025, 1:08:47 AM
Last updated: 1/7/2026, 4:20:00 AM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.