CVE-2025-44961
该漏洞允许经过身份验证的vSZ用户通过未正确处理的IP地址参数执行命令注入攻击,可能导致远程代码执行。由于尚未有补丁发布,建议限制对无线管理环境的访问,并使用HTTPS或SSH等安全协议进行管理。 2025-7-8 09:35:0 Author: claroty.com(查看原文) 阅读量:6 收藏

Critical Threat

CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.

No patches have been supplied by the vendor at this time. To mitigate risk, network administrators should limit access to the wireless management environments that use these affected products, allowing a limited set of trusted users and their authenticated clients to manage Ruckus infrastructure via a secure protocol such as HTTPS or SSH.


文章来源: https://claroty.com/team82/disclosure-dashboard/cve-2025-44961
如有侵权请联系:admin#unsafe.sh