The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a command execution service on TCP port 2004 running with root privileges. Authentication to this service relies on a hardcoded Time-based One-Time Password (TOTP) secret and an embedded static token. An attacker who extracts these credentials from the appliance or a compromised device can generate valid authentication tokens and execute arbitrary OS commands with root privileges, resulting in complete system compromise.
CVSS
No CVSS.
References
Configurations
No configuration.
History
09 Jan 2026, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-09 17:15
Updated : 2026-01-13 14:03
NVD link : CVE-2025-69425
Mitre link : CVE-2025-69425
CVE.ORG link : CVE-2025-69425
JSON object : View
Products Affected
No product.
