CVE-2025-46123: n/a
An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where the authenticated configuration endpoint `/admin/_conf.jsp` writes the Wi-Fi guest password to memory with snprintf using the attacker-supplied value as the format string; a crafted password therefore triggers uncontrolled format-string processing and enables remote code execution on the controller.
AI Analysis
Technical Summary
CVE-2025-46123 is a high-severity vulnerability affecting CommScope Ruckus Unleashed wireless controllers prior to versions 200.15.6.212.14 and 200.17.7.0.139, as well as Ruckus ZoneDirector controllers prior to version 10.5.1.0.279. The vulnerability arises from improper handling of the Wi-Fi guest password in the authenticated configuration endpoint `/admin/_conf.jsp`. Specifically, the endpoint uses the C function snprintf to write the guest password to memory, but it incorrectly uses the attacker-supplied password as the format string. This results in an uncontrolled format string vulnerability (CWE-134), which can be exploited to execute arbitrary code remotely on the controller. The attacker must have authenticated access to the configuration interface, but no user interaction beyond that is required. Exploitation could allow an attacker to gain full control over the wireless controller, potentially leading to compromise of the network infrastructure managed by the device. The vulnerability has a CVSS v3.1 base score of 7.2, reflecting its high impact on confidentiality, integrity, and availability due to remote code execution capabilities. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and should be considered a significant risk to affected deployments. No official patches or mitigation links are provided in the data, indicating that organizations must monitor vendor advisories closely for updates or apply workarounds where possible.
Potential Impact
For European organizations, this vulnerability poses a serious risk to the security and stability of their wireless network infrastructure. Ruckus wireless controllers are commonly used in enterprise, education, hospitality, and public sector environments across Europe. Successful exploitation could allow attackers to execute arbitrary code on the controller, leading to unauthorized access to network management functions, interception or manipulation of network traffic, and potential lateral movement within the corporate network. This could result in data breaches, disruption of wireless services, and compromise of sensitive information. Given the authenticated access requirement, insider threats or compromised credentials could be leveraged to exploit this vulnerability. The impact is heightened in critical infrastructure sectors and organizations with large-scale wireless deployments, where network availability and integrity are paramount. Additionally, the vulnerability could be exploited as a foothold for further attacks against European organizations, especially those with strategic importance or handling sensitive data.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately verify if their Ruckus Unleashed or ZoneDirector controllers are running affected versions and prioritize upgrading to the fixed versions once released by CommScope. 2) Restrict access to the administrative interface `/admin/_conf.jsp` by implementing strong network segmentation, limiting management access to trusted IP addresses, and enforcing multi-factor authentication for all administrative accounts. 3) Regularly audit and rotate administrative credentials to reduce the risk of credential compromise. 4) Monitor network and device logs for unusual activity indicative of exploitation attempts, such as unexpected format string anomalies or unauthorized configuration changes. 5) If patches are not yet available, consider temporarily disabling guest Wi-Fi functionality or restricting guest password changes until a fix is applied. 6) Employ intrusion detection/prevention systems capable of detecting format string exploitation patterns targeting these controllers. 7) Maintain an up-to-date asset inventory and vulnerability management process to ensure timely identification and remediation of such vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-46123: n/a
Description
An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where the authenticated configuration endpoint `/admin/_conf.jsp` writes the Wi-Fi guest password to memory with snprintf using the attacker-supplied value as the format string; a crafted password therefore triggers uncontrolled format-string processing and enables remote code execution on the controller.
AI-Powered Analysis
Technical Analysis
CVE-2025-46123 is a high-severity vulnerability affecting CommScope Ruckus Unleashed wireless controllers prior to versions 200.15.6.212.14 and 200.17.7.0.139, as well as Ruckus ZoneDirector controllers prior to version 10.5.1.0.279. The vulnerability arises from improper handling of the Wi-Fi guest password in the authenticated configuration endpoint `/admin/_conf.jsp`. Specifically, the endpoint uses the C function snprintf to write the guest password to memory, but it incorrectly uses the attacker-supplied password as the format string. This results in an uncontrolled format string vulnerability (CWE-134), which can be exploited to execute arbitrary code remotely on the controller. The attacker must have authenticated access to the configuration interface, but no user interaction beyond that is required. Exploitation could allow an attacker to gain full control over the wireless controller, potentially leading to compromise of the network infrastructure managed by the device. The vulnerability has a CVSS v3.1 base score of 7.2, reflecting its high impact on confidentiality, integrity, and availability due to remote code execution capabilities. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and should be considered a significant risk to affected deployments. No official patches or mitigation links are provided in the data, indicating that organizations must monitor vendor advisories closely for updates or apply workarounds where possible.
Potential Impact
For European organizations, this vulnerability poses a serious risk to the security and stability of their wireless network infrastructure. Ruckus wireless controllers are commonly used in enterprise, education, hospitality, and public sector environments across Europe. Successful exploitation could allow attackers to execute arbitrary code on the controller, leading to unauthorized access to network management functions, interception or manipulation of network traffic, and potential lateral movement within the corporate network. This could result in data breaches, disruption of wireless services, and compromise of sensitive information. Given the authenticated access requirement, insider threats or compromised credentials could be leveraged to exploit this vulnerability. The impact is heightened in critical infrastructure sectors and organizations with large-scale wireless deployments, where network availability and integrity are paramount. Additionally, the vulnerability could be exploited as a foothold for further attacks against European organizations, especially those with strategic importance or handling sensitive data.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately verify if their Ruckus Unleashed or ZoneDirector controllers are running affected versions and prioritize upgrading to the fixed versions once released by CommScope. 2) Restrict access to the administrative interface `/admin/_conf.jsp` by implementing strong network segmentation, limiting management access to trusted IP addresses, and enforcing multi-factor authentication for all administrative accounts. 3) Regularly audit and rotate administrative credentials to reduce the risk of credential compromise. 4) Monitor network and device logs for unusual activity indicative of exploitation attempts, such as unexpected format string anomalies or unauthorized configuration changes. 5) If patches are not yet available, consider temporarily disabling guest Wi-Fi functionality or restricting guest password changes until a fix is applied. 6) Employ intrusion detection/prevention systems capable of detecting format string exploitation patterns targeting these controllers. 7) Maintain an up-to-date asset inventory and vulnerability management process to ensure timely identification and remediation of such vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 687e52aea83201eaac106025
Added to database: 7/21/2025, 2:46:06 PM
Last enriched: 7/29/2025, 1:08:47 AM
Last updated: 11/16/2025, 6:31:27 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13251: SQL Injection in WeiYe-Jing datax-web
MediumCVE-2025-13250: Improper Access Controls in WeiYe-Jing datax-web
MediumCVE-2025-13249: Unrestricted Upload in Jiusi OA
MediumCVE-2025-13248: SQL Injection in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2025-13247: SQL Injection in PHPGurukul Tourism Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.