CVE-2025-46122

An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, where the authenticated diagnostics API endpoint `/admin/_cmdstat.jsp` passes attacker-controlled input to the shell without adequate validation, enabling a remote attacker to specify a target by MAC address and execute arbitrary commands as root.
Configurations

No configuration.

History

23 Jul 2025, 18:15

Type Values Removed Values Added
Summary
  • (es) Se descubrió un problema en CommScope Ruckus Unleashed anterior a 200.15.6.212.14 y 200.17.7.0.139, donde el endpoint de la API de diagnóstico autenticado `/admin/_cmdstat.jsp` pasa la entrada controlada por el atacante al shell sin la validación adecuada, lo que permite a un atacante remoto especificar un objetivo por dirección MAC y ejecutar comandos arbitrarios como root.
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 9.1

22 Jul 2025, 17:15

Type Values Removed Values Added
References
  • {'url': 'http://commscope.com', 'source': 'cve@mitre.org'}

22 Jul 2025, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CWE CWE-77

21 Jul 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-21 15:15

Updated : 2025-07-23 18:15


NVD link : CVE-2025-46122

Mitre link : CVE-2025-46122

CVE.ORG link : CVE-2025-46122


JSON object : View

Products Affected

No product.

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')