CVE Vulnerabilities

CVE-2025-46123

Use of Externally-Controlled Format String

Published: Jul 21, 2025 | Modified: Aug 05, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where the authenticated configuration endpoint /admin/_conf.jsp writes the Wi-Fi guest password to memory with snprintf using the attacker-supplied value as the format string; a crafted password therefore triggers uncontrolled format-string processing and enables remote code execution on the controller.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
Ruckus_unleashedRuckuswireless*200.15.6.212.14 (excluding)
Ruckus_unleashedRuckuswireless200.17 (including)200.17.7.0.139 (excluding)
Ruckus_zonedirectorRuckuswireless*10.5.1.0.279 (excluding)

Potential Mitigations

References