RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build allows OS command injection via a certain parameter in an API route.
References
Link | Resource |
---|---|
https://claroty.com/team82/disclosure-dashboard/cve-2025-44960 | Third Party Advisory |
https://kb.cert.org/vuls/id/613753 | Third Party Advisory US Government Resource |
https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
07 Aug 2025, 17:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Commscope ruckus Smartzone 300-federal
Commscope ruckus C110 Commscope ruckus Smartzone 144-federal Commscope ruckus M510 Commscope ruckus H350 Commscope Commscope ruckus Virtual Smartzone-federal Commscope ruckus T310d Commscope ruckus Smartzone 100-d Commscope ruckus T750se Commscope ruckus T310n Commscope ruckus H320 Commscope ruckus R320 Commscope ruckus Smartzone 144 Commscope ruckus R510 Commscope ruckus Smartzone Firmware Commscope ruckus R720 Commscope ruckus R610 Commscope ruckus T750 Commscope ruckus R560 Commscope ruckus Smartzone 300 Commscope ruckus T310c Commscope ruckus Virtual Smartzone Commscope ruckus Smartzone 100 Commscope ruckus R750 Commscope ruckus T310s Commscope ruckus R730 Commscope ruckus H510 Commscope ruckus Network Director Commscope ruckus E510 Commscope ruckus T350se Commscope ruckus R710 |
|
CPE | cpe:2.3:h:commscope:ruckus_m510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310s:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h320:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t750:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_100:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r560:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h350:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r720:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_e510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r750:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:-:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r320:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r730:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_c110:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_144:-:*:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_virtual_smartzone:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r610:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p2:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r710:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_300:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_300-federal:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t750se:-:*:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_virtual_smartzone-federal:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.1.0:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310d:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_100-d:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_144-federal:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t350se:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.0.0:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310n:-:*:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_network_director:*:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h510:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310c:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p3:*:*:*:*:*:* |
|
References | () https://claroty.com/team82/disclosure-dashboard/cve-2025-44960 - Third Party Advisory | |
References | () https://kb.cert.org/vuls/id/613753 - Third Party Advisory, US Government Resource | |
References | () https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e - Vendor Advisory |
05 Aug 2025, 14:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-04 17:15
Updated : 2025-08-07 17:59
NVD link : CVE-2025-44960
Mitre link : CVE-2025-44960
CVE.ORG link : CVE-2025-44960
JSON object : View
Products Affected
commscope
- ruckus_t750
- ruckus_c110
- ruckus_h350
- ruckus_r750
- ruckus_t750se
- ruckus_m510
- ruckus_network_director
- ruckus_r710
- ruckus_r560
- ruckus_virtual_smartzone
- ruckus_smartzone_300
- ruckus_smartzone_100
- ruckus_e510
- ruckus_r720
- ruckus_h320
- ruckus_t310c
- ruckus_smartzone_144
- ruckus_t310s
- ruckus_h510
- ruckus_smartzone_100-d
- ruckus_r610
- ruckus_r320
- ruckus_smartzone_144-federal
- ruckus_r730
- ruckus_t310d
- ruckus_t310n
- ruckus_t350se
- ruckus_smartzone_300-federal
- ruckus_r510
- ruckus_virtual_smartzone-federal
- ruckus_smartzone_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')