In RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build, OS command injection can occur via an IP address field provided by an authenticated user.
Metrics
Affected Vendors & Products
References
History
Thu, 07 Aug 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Commscope
Commscope ruckus C110 Commscope ruckus E510 Commscope ruckus H320 Commscope ruckus H350 Commscope ruckus H510 Commscope ruckus M510 Commscope ruckus Network Director Commscope ruckus R320 Commscope ruckus R510 Commscope ruckus R560 Commscope ruckus R610 Commscope ruckus R710 Commscope ruckus R720 Commscope ruckus R730 Commscope ruckus R750 Commscope ruckus Smartzone 100 Commscope ruckus Smartzone 100-d Commscope ruckus Smartzone 144 Commscope ruckus Smartzone 144-federal Commscope ruckus Smartzone 300 Commscope ruckus Smartzone 300-federal Commscope ruckus Smartzone Firmware Commscope ruckus T310c Commscope ruckus T310d Commscope ruckus T310n Commscope ruckus T310s Commscope ruckus T350se Commscope ruckus T750 Commscope ruckus T750se Commscope ruckus Virtual Smartzone Commscope ruckus Virtual Smartzone-federal |
|
CPEs | cpe:2.3:a:commscope:ruckus_network_director:*:*:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_virtual_smartzone-federal:-:*:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_virtual_smartzone:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_c110:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_e510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h320:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h350:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_m510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r320:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r560:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r610:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r710:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r720:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r730:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r750:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_100-d:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_100:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_144-federal:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_144:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_300-federal:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_300:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310c:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310d:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310n:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310s:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t350se:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t750:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t750se:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:-:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p2:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p3:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.0.0:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.1.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Commscope
Commscope ruckus C110 Commscope ruckus E510 Commscope ruckus H320 Commscope ruckus H350 Commscope ruckus H510 Commscope ruckus M510 Commscope ruckus Network Director Commscope ruckus R320 Commscope ruckus R510 Commscope ruckus R560 Commscope ruckus R610 Commscope ruckus R710 Commscope ruckus R720 Commscope ruckus R730 Commscope ruckus R750 Commscope ruckus Smartzone 100 Commscope ruckus Smartzone 100-d Commscope ruckus Smartzone 144 Commscope ruckus Smartzone 144-federal Commscope ruckus Smartzone 300 Commscope ruckus Smartzone 300-federal Commscope ruckus Smartzone Firmware Commscope ruckus T310c Commscope ruckus T310d Commscope ruckus T310n Commscope ruckus T310s Commscope ruckus T350se Commscope ruckus T750 Commscope ruckus T750se Commscope ruckus Virtual Smartzone Commscope ruckus Virtual Smartzone-federal |
Tue, 05 Aug 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 04 Aug 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build, OS command injection can occur via an IP address field provided by an authenticated user. | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-08-04T00:00:00.000Z
Updated: 2025-08-05T14:43:23.513Z
Reserved: 2025-04-22T00:00:00.000Z
Link: CVE-2025-44961

Updated: 2025-08-05T14:43:05.632Z

Status : Analyzed
Published: 2025-08-04T17:15:30.210
Modified: 2025-08-07T17:59:15.927
Link: CVE-2025-44961

No data.