CVE-2025-44960
该文章描述了一个关键安全威胁:CWE-78 OS命令注入漏洞存在于vSZ API中,允许攻击者通过未经过滤的参数执行恶意代码。目前无补丁可用,建议限制管理环境访问并使用HTTPS或SSH等安全协议以降低风险。 2025-7-8 09:34:0 Author: claroty.com(查看原文) 阅读量:6 收藏

Critical Threat

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'

Remote Code Execution. A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.

No patches have been supplied by the vendor at this time. To mitigate risk, network administrators should limit access to the wireless management environments that use these affected products, allowing a limited set of trusted users and their authenticated clients to manage Ruckus infrastructure via a secure protocol such as HTTPS or SSH.


文章来源: https://claroty.com/team82/disclosure-dashboard/cve-2025-44960
如有侵权请联系:admin#unsafe.sh