Subscriptions
No data.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 09 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 09 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a command execution service on TCP port 2004 running with root privileges. Authentication to this service relies on a hardcoded Time-based One-Time Password (TOTP) secret and an embedded static token. An attacker who extracts these credentials from the appliance or a compromised device can generate valid authentication tokens and execute arbitrary OS commands with root privileges, resulting in complete system compromise. | |
| Title | Ruckus vRIoT IoT Controller < 3.0.0.0 Hardcoded Tokens RCE | |
| Weaknesses | CWE-306 CWE-798 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-09T18:37:55.088Z
Reserved: 2026-01-08T20:48:39.252Z
Link: CVE-2025-69425
Updated: 2026-01-09T17:48:43.489Z
Status : Awaiting Analysis
Published: 2026-01-09T17:15:53.847
Modified: 2026-01-13T14:03:46.203
Link: CVE-2025-69425
No data.
OpenCVE Enrichment
No data.