Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
References
| Link | Resource |
|---|---|
| https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/ | Exploit Third Party Advisory |
| https://support.ruckuswireless.com/security_bulletins/315 | Patch Product Vendor Advisory |
| https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/ | Exploit Third Party Advisory |
| https://support.ruckuswireless.com/security_bulletins/315 | Patch Product Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-25717 | US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
Configuration 8 (hide)
| AND |
|
History
03 Nov 2025, 18:14
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-25717 - US Government Resource |
22 Oct 2025, 00:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
22 Aug 2025, 21:09
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:ruckuswireless:smartzone:6.1.0.0.935:*:*:*:*:*:*:* |
cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.0.0.935:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:*:*:*:*:*:*:*:* |
| First Time |
Commscope ruckus Smartzone Firmware
Commscope |
21 Nov 2024, 07:49
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/ - Exploit, Third Party Advisory | |
| References | () https://support.ruckuswireless.com/security_bulletins/315 - Patch, Product, Vendor Advisory |
23 Feb 2023, 16:26
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-02-13 20:15
Updated : 2025-11-03 18:14
NVD link : CVE-2023-25717
Mitre link : CVE-2023-25717
CVE.ORG link : CVE-2023-25717
JSON object : View
Products Affected
ruckuswireless
- t710s
- t710
- h500
- r650
- r730
- p300
- h550
- t300
- sz300-federal
- t310c
- r750
- r500
- sz-144-federal
- t310s
- t301n
- r550
- sz300
- q710
- t610
- e510
- sz-144
- ruckus_wireless_admin
- q910
- h350
- t811-cm\(non-spf\)
- r850
- t350c
- zd1200
- t811-cm
- r300
- zd1100
- r610
- r600
- t301s
- q410
- t750
- zd1000
- zd5000
- r310
- r510
- r720
- t350d
- r700
- smartzone_ap
- zd3000
- r560
- t750se
- h320
- h510
- m510-jp
- r760
- r350
- t350se
- r320
- t310d
- sz100
- t310n
- m510
- t504
- r710
commscope
- ruckus_smartzone_firmware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
