Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 09 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 09 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a command execution service on TCP port 2004 running with root privileges. Authentication to this service relies on a hardcoded Time-based One-Time Password (TOTP) secret and an embedded static token. An attacker who extracts these credentials from the appliance or a compromised device can generate valid authentication tokens and execute arbitrary OS commands with root privileges, resulting in complete system compromise. | |
| Title | Ruckus vRIoT IoT Controller < 3.0.0.0 Hardcoded Tokens RCE | |
| Weaknesses | CWE-306 CWE-798 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:08:54.076Z
Reserved: 2026-01-08T20:48:39.252Z
Link: CVE-2025-69425
Updated: 2026-01-09T17:48:43.489Z
Status : Deferred
Published: 2026-01-09T17:15:53.847
Modified: 2026-04-15T14:34:27.800
Link: CVE-2025-69425
No data.
OpenCVE Enrichment
No data.