
RUCKUS Networks designs, sells and services IT networking products, such as switches, WLAN controllers, Access points, IoT gateways and software. RUCKUS started as wireless only company selling to Internet Service Providers(ISP), Hotel chains, large public venues and later extended to education.
RUCKUS Wireless Admin Remote Code Execution Vulnerability | CVE-2023-25717
RUCKUS Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
Following is a exploit in the wild.

Let's break down what the attacker is trying to do.
SonicWall Capture Labs provides protection against this threat via the following signature:
RUCKUS has patched this vulnerability.
Threat Graph

Share This Article

An Article By
An Article By
Security News
Security News