In RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build, OS command injection can occur via an IP address field provided by an authenticated user.
References
Link | Resource |
---|---|
https://claroty.com/team82/disclosure-dashboard/cve-2025-44961 | Third Party Advisory |
https://kb.cert.org/vuls/id/613753 | Third Party Advisory US Government Resource |
https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
07 Aug 2025, 17:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://claroty.com/team82/disclosure-dashboard/cve-2025-44961 - Third Party Advisory | |
References | () https://kb.cert.org/vuls/id/613753 - Third Party Advisory, US Government Resource | |
References | () https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e - Vendor Advisory | |
CPE | cpe:2.3:h:commscope:ruckus_e510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_c110:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p2:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r320:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p3:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.1.0:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:-:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310n:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t350se:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310c:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r730:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_100-d:-:*:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_virtual_smartzone-federal:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.0.0:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r610:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_100:-:*:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_virtual_smartzone:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r710:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_m510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h350:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_300-federal:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r560:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310s:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t750:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h320:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t750se:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r720:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_300:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310d:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_144-federal:-:*:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_network_director:*:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r750:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_144:-:*:*:*:*:*:*:* |
|
First Time |
Commscope ruckus R320
Commscope ruckus Smartzone 300 Commscope ruckus C110 Commscope ruckus Smartzone 100-d Commscope ruckus Smartzone 300-federal Commscope ruckus Virtual Smartzone-federal Commscope ruckus Network Director Commscope ruckus R730 Commscope ruckus T350se Commscope ruckus M510 Commscope ruckus Virtual Smartzone Commscope ruckus T310d Commscope ruckus H510 Commscope ruckus Smartzone 100 Commscope ruckus R750 Commscope ruckus Smartzone 144 Commscope ruckus H320 Commscope ruckus R610 Commscope ruckus T310c Commscope ruckus T750se Commscope ruckus R510 Commscope ruckus T310n Commscope ruckus T750 Commscope ruckus Smartzone 144-federal Commscope ruckus E510 Commscope ruckus Smartzone Firmware Commscope ruckus R720 Commscope ruckus R710 Commscope ruckus R560 Commscope ruckus T310s Commscope ruckus H350 Commscope |
05 Aug 2025, 14:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-04 17:15
Updated : 2025-08-07 17:59
NVD link : CVE-2025-44961
Mitre link : CVE-2025-44961
CVE.ORG link : CVE-2025-44961
JSON object : View
Products Affected
commscope
- ruckus_h350
- ruckus_t350se
- ruckus_t750
- ruckus_virtual_smartzone
- ruckus_h320
- ruckus_smartzone_300
- ruckus_t310s
- ruckus_e510
- ruckus_r320
- ruckus_smartzone_firmware
- ruckus_smartzone_144-federal
- ruckus_t750se
- ruckus_r560
- ruckus_r610
- ruckus_r750
- ruckus_t310d
- ruckus_r730
- ruckus_t310c
- ruckus_r720
- ruckus_smartzone_300-federal
- ruckus_r710
- ruckus_t310n
- ruckus_smartzone_144
- ruckus_smartzone_100
- ruckus_virtual_smartzone-federal
- ruckus_c110
- ruckus_r510
- ruckus_smartzone_100-d
- ruckus_network_director
- ruckus_m510
- ruckus_h510
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')