CVE-2025-46116

An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where an authenticated attacker can disable the passphrase requirement for a hidden CLI command `!v54!` via a management API call and then invoke it to escape the restricted shell and obtain a root shell on the controller.
Configurations

No configuration.

History

22 Jul 2025, 17:15

Type Values Removed Values Added
References
  • {'url': 'http://commscope.com', 'source': 'cve@mitre.org'}

21 Jul 2025, 19:15

Type Values Removed Values Added
CWE CWE-269
CWE-250
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

21 Jul 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-21 15:15

Updated : 2025-07-22 17:15


NVD link : CVE-2025-46116

Mitre link : CVE-2025-46116

CVE.ORG link : CVE-2025-46116


JSON object : View

Products Affected

No product.

CWE
CWE-250

Execution with Unnecessary Privileges

CWE-269

Improper Privilege Management