In RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build, OS command injection can occur via an IP address field provided by an authenticated user.
References
Link | Resource |
---|---|
https://claroty.com/team82/disclosure-dashboard/cve-2025-44961 | Third Party Advisory |
https://kb.cert.org/vuls/id/613753 | Third Party Advisory US Government Resource |
https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
07 Aug 2025, 17:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Commscope ruckus R750
Commscope ruckus C110 Commscope ruckus R730 Commscope ruckus Smartzone 300-federal Commscope ruckus H320 Commscope ruckus M510 Commscope ruckus T350se Commscope ruckus T310s Commscope ruckus H350 Commscope ruckus Smartzone 100 Commscope ruckus R510 Commscope ruckus R560 Commscope ruckus R720 Commscope ruckus Network Director Commscope ruckus Virtual Smartzone Commscope ruckus T750 Commscope ruckus Virtual Smartzone-federal Commscope ruckus T310d Commscope ruckus E510 Commscope ruckus R320 Commscope ruckus Smartzone 300 Commscope ruckus R610 Commscope ruckus Smartzone 100-d Commscope ruckus Smartzone 144 Commscope ruckus R710 Commscope ruckus T310c Commscope ruckus T310n Commscope ruckus T750se Commscope ruckus H510 Commscope ruckus Smartzone Firmware Commscope ruckus Smartzone 144-federal Commscope |
|
References | () https://claroty.com/team82/disclosure-dashboard/cve-2025-44961 - Third Party Advisory | |
References | () https://kb.cert.org/vuls/id/613753 - Third Party Advisory, US Government Resource | |
References | () https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e - Vendor Advisory | |
CPE | cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.1.0:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310d:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310c:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r720:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r750:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.0.0:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h350:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p3:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:-:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_e510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t350se:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_300-federal:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_100-d:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r320:-:*:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_network_director:*:*:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_virtual_smartzone-federal:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_144:-:*:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_virtual_smartzone:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310s:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p2:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t750:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r710:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r610:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_144-federal:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_c110:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_100:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_300:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310n:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_m510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r560:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t750se:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r730:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h320:-:*:*:*:*:*:*:* |
05 Aug 2025, 14:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-04 17:15
Updated : 2025-08-07 17:59
NVD link : CVE-2025-44961
Mitre link : CVE-2025-44961
CVE.ORG link : CVE-2025-44961
JSON object : View
Products Affected
commscope
- ruckus_h510
- ruckus_smartzone_144
- ruckus_virtual_smartzone-federal
- ruckus_m510
- ruckus_r610
- ruckus_t350se
- ruckus_smartzone_100-d
- ruckus_r720
- ruckus_virtual_smartzone
- ruckus_c110
- ruckus_r750
- ruckus_r730
- ruckus_r560
- ruckus_r320
- ruckus_t310n
- ruckus_e510
- ruckus_smartzone_300
- ruckus_h350
- ruckus_r510
- ruckus_t310c
- ruckus_t750
- ruckus_smartzone_300-federal
- ruckus_r710
- ruckus_t310s
- ruckus_smartzone_100
- ruckus_smartzone_firmware
- ruckus_t750se
- ruckus_t310d
- ruckus_smartzone_144-federal
- ruckus_network_director
- ruckus_h320
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')