Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-25717


Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.


Security Impact Summary

This vulnerability carries a CRITICAL severity rating with a CVSS v3.1 score of 9.8, indicating it can be exploited remotely over the network with relatively low complexity without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 61 products from ruckuswireless, from ruckuswireless, from ruckuswireless and 58 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2023, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2023-02-13T20:15:10.973

Last Modified

2025-11-03T18:14:23.513

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

Weaknesses
  • Type: Primary
    CWE-94
  • Type: Secondary
    CWE-94

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application ruckuswireless ruckus_wireless_admin ≤ 10.4 Yes
Operating System ruckuswireless smartzone_ap < 6.1.0.0.9240 Yes
Hardware ruckuswireless e510 - No
Hardware ruckuswireless h320 - No
Hardware ruckuswireless h350 - No
Hardware ruckuswireless h510 - No
Hardware ruckuswireless h550 - No
Hardware ruckuswireless m510 - No
Hardware ruckuswireless r310 - No
Hardware ruckuswireless r320 - No
Hardware ruckuswireless r350 - No
Hardware ruckuswireless r510 - No
Hardware ruckuswireless r550 - No
Hardware ruckuswireless r610 - No
Hardware ruckuswireless r650 - No
Hardware ruckuswireless r710 - No
Hardware ruckuswireless r720 - No
Hardware ruckuswireless r730 - No
Hardware ruckuswireless r750 - No
Hardware ruckuswireless r760 - No
Hardware ruckuswireless r850 - No
Hardware ruckuswireless sz-144 - No
Hardware ruckuswireless sz100 - No
Hardware ruckuswireless sz300 - No
Hardware ruckuswireless t310c - No
Hardware ruckuswireless t310d - No
Hardware ruckuswireless t310n - No
Hardware ruckuswireless t310s - No
Hardware ruckuswireless t350c - No
Hardware ruckuswireless t350d - No
Hardware ruckuswireless t350se - No
Hardware ruckuswireless t610 - No
Hardware ruckuswireless t710 - No
Hardware ruckuswireless t710s - No
Hardware ruckuswireless t750 - No
Hardware ruckuswireless t750se - No
Hardware ruckuswireless t811-cm - No
Application ruckuswireless ruckus_wireless_admin ≤ 10.4 Yes
Operating System ruckuswireless smartzone_ap < 5.2.2.0.2064 Yes
Hardware ruckuswireless e510 - No
Hardware ruckuswireless h320 - No
Hardware ruckuswireless h510 - No
Hardware ruckuswireless m510 - No
Hardware ruckuswireless r310 - No
Hardware ruckuswireless r320 - No
Hardware ruckuswireless r500 - No
Hardware ruckuswireless r510 - No
Hardware ruckuswireless r550 - No
Hardware ruckuswireless r600 - No
Hardware ruckuswireless r610 - No
Hardware ruckuswireless r650 - No
Hardware ruckuswireless r710 - No
Hardware ruckuswireless r720 - No
Hardware ruckuswireless r730 - No
Hardware ruckuswireless r750 - No
Hardware ruckuswireless r850 - No
Hardware ruckuswireless t300 - No
Hardware ruckuswireless t301n - No
Hardware ruckuswireless t301s - No
Hardware ruckuswireless t310c - No
Hardware ruckuswireless t310d - No
Hardware ruckuswireless t310n - No
Hardware ruckuswireless t310s - No
Hardware ruckuswireless t504 - No
Hardware ruckuswireless t610 - No
Hardware ruckuswireless t710 - No
Hardware ruckuswireless t710s - No
Hardware ruckuswireless t750 - No
Hardware ruckuswireless t750se - No
Hardware ruckuswireless t811-cm - No
Application ruckuswireless ruckus_wireless_admin ≤ 10.4 Yes
Operating System ruckuswireless smartzone_ap < 3.6.2.0.795 Yes
Hardware ruckuswireless h500 - No
Hardware ruckuswireless r300 - No
Hardware ruckuswireless r700 - No
Application ruckuswireless ruckus_wireless_admin ≤ 10.4 Yes
Operating System ruckuswireless smartzone_ap < 6.1.1.0.1274 Yes
Hardware ruckuswireless r560 - No
Application ruckuswireless ruckus_wireless_admin ≤ 10.4 Yes
Operating System commscope ruckus_smartzone_firmware < 5.2.1.3 Yes
Hardware ruckuswireless sz-144 - No
Hardware ruckuswireless sz300 - No
Application ruckuswireless ruckus_wireless_admin ≤ 10.4 Yes
Operating System commscope ruckus_smartzone_firmware 6.1.0.0.935 Yes
Hardware ruckuswireless sz-144 - No
Hardware ruckuswireless sz100 - No
Hardware ruckuswireless sz300 - No
Application ruckuswireless ruckus_wireless_admin ≤ 10.4 Yes
Hardware ruckuswireless m510-jp - No
Hardware ruckuswireless p300 - No
Hardware ruckuswireless q410 - No
Hardware ruckuswireless q710 - No
Hardware ruckuswireless q910 - No
Hardware ruckuswireless t811-cm\(non-spf\) - No
Hardware ruckuswireless zd1000 - No
Hardware ruckuswireless zd1100 - No
Hardware ruckuswireless zd1200 - No
Hardware ruckuswireless zd3000 - No
Hardware ruckuswireless zd5000 - No
Application ruckuswireless ruckus_wireless_admin ≤ 10.4 Yes
Operating System commscope ruckus_smartzone_firmware < 5.2.1.3.1695 Yes
Hardware ruckuswireless sz-144-federal - No
Hardware ruckuswireless sz300-federal - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For ruckuswireless's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.