Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 09 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 09 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) contain hardcoded credentials for an operating system user account within an initialization script. The SSH service is network-accessible without IP-based restrictions. Although the configuration disables SCP and pseudo-TTY allocation, an attacker can authenticate using the hardcoded credentials and establish SSH local port forwarding to access the Docker socket. By mounting the host filesystem via Docker, an attacker can escape the container and execute arbitrary OS commands as root on the underlying vRIoT controller, resulting in complete system compromise. | |
| Title | Ruckus vRIoT IoT Controller < 3.0.0.0 Hardcoded SSH Credentials RCE | |
| Weaknesses | CWE-732 CWE-798 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:08:54.950Z
Reserved: 2026-01-08T20:48:39.252Z
Link: CVE-2025-69426
Updated: 2026-01-09T17:48:28.299Z
Status : Deferred
Published: 2026-01-09T17:15:53.997
Modified: 2026-04-15T14:34:27.800
Link: CVE-2025-69426
No data.
OpenCVE Enrichment
No data.