Vulnerability Details CVE-2025-44961
In RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build, OS command injection can occur via an IP address field provided by an authenticated user.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 34.3%
CVSS Severity
CVSS v3 Score 9.9
Products affected by CVE-2025-44961
-
cpe:2.3:a:commscope:ruckus_network_director:-
-
cpe:2.3:a:commscope:ruckus_network_director:3.5.0.98
-
cpe:2.3:a:commscope:ruckus_network_director:3.5.0.99
-
cpe:2.3:a:commscope:ruckus_network_director:4.0.0.23
-
cpe:2.3:a:commscope:ruckus_network_director:4.0.0.24
-
cpe:2.3:a:commscope:ruckus_network_director:4.0.0.25
-
cpe:2.3:a:commscope:ruckus_network_director:4.0.0.29
-
cpe:2.3:a:commscope:ruckus_network_director:4.0.0.36
-
cpe:2.3:a:commscope:ruckus_network_director:4.0.0.45
-
cpe:2.3:a:commscope:ruckus_network_director:4.0.0.47
-
cpe:2.3:a:commscope:ruckus_network_director:4.5.0.12
-
cpe:2.3:a:commscope:ruckus_network_director:4.5.0.13
-
cpe:2.3:a:commscope:ruckus_network_director:4.5.0.17
-
cpe:2.3:a:commscope:ruckus_network_director:4.5.0.22
-
cpe:2.3:a:commscope:ruckus_network_director:4.5.0.26
-
cpe:2.3:a:commscope:ruckus_network_director:4.5.0.30
-
cpe:2.3:a:commscope:ruckus_network_director:4.5.0.32
-
cpe:2.3:a:commscope:ruckus_network_director:4.5.0.33
-
cpe:2.3:a:commscope:ruckus_network_director:4.5.0.34
-
cpe:2.3:a:commscope:ruckus_network_director:4.5.0.37
-
cpe:2.3:a:commscope:ruckus_virtual_smartzone-federal:-
-
cpe:2.3:a:commscope:ruckus_virtual_smartzone:-
-
cpe:2.3:h:commscope:ruckus_c110:-
-
cpe:2.3:h:commscope:ruckus_e510:-
-
cpe:2.3:h:commscope:ruckus_h320:-
-
cpe:2.3:h:commscope:ruckus_h350:-
-
cpe:2.3:h:commscope:ruckus_h510:-
-
cpe:2.3:h:commscope:ruckus_m510:-
-
cpe:2.3:h:commscope:ruckus_r320:-
-
cpe:2.3:h:commscope:ruckus_r510:-
-
cpe:2.3:h:commscope:ruckus_r560:-
-
cpe:2.3:h:commscope:ruckus_r610:-
-
cpe:2.3:h:commscope:ruckus_r710:-
-
cpe:2.3:h:commscope:ruckus_r720:-
-
cpe:2.3:h:commscope:ruckus_r730:-
-
cpe:2.3:h:commscope:ruckus_r750:-
-
cpe:2.3:h:commscope:ruckus_smartzone_100-d:-
-
cpe:2.3:h:commscope:ruckus_smartzone_100:-
-
cpe:2.3:h:commscope:ruckus_smartzone_144-federal:-
-
cpe:2.3:h:commscope:ruckus_smartzone_144:-
-
cpe:2.3:h:commscope:ruckus_smartzone_300-federal:-
-
cpe:2.3:h:commscope:ruckus_smartzone_300:-
-
cpe:2.3:h:commscope:ruckus_t310c:-
-
cpe:2.3:h:commscope:ruckus_t310d:-
-
cpe:2.3:h:commscope:ruckus_t310n:-
-
cpe:2.3:h:commscope:ruckus_t310s:-
-
cpe:2.3:h:commscope:ruckus_t350se:-
-
cpe:2.3:h:commscope:ruckus_t750:-
-
cpe:2.3:h:commscope:ruckus_t750se:-
-
cpe:2.3:o:commscope:ruckus_smartzone_firmware:-
-
cpe:2.3:o:commscope:ruckus_smartzone_firmware:5.2.1.3
-
cpe:2.3:o:commscope:ruckus_smartzone_firmware:5.2.1.3.1695
-
cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.0.0.935
-
cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2
-
cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.0.0
-
cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.1.0