Description

An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, where the functions `stamgr_cfg_adpt_addStaFavourite` and `stamgr_cfg_adpt_addStaIot` pass a client hostname directly to snprintf as the format string. A remote attacker can exploit this flaw either by sending a crafted request to the authenticated endpoint `/admin/_conf.jsp`, or without authentication and without direct network access to the controller by spoofing the MAC address of a favourite station and embedding malicious format specifiers in the DHCP hostname field, resulting in unauthenticated format-string processing and arbitrary code execution on the controller.

INFO

Published Date :

2025-07-21T00:00:00.000Z

Last Modified :

2025-07-28T19:42:06.394Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-46121 vulnerability.

Vendors Products
Commscope
  • Ruckus C110
  • Ruckus E510
  • Ruckus H320
  • Ruckus H350
  • Ruckus H510
  • Ruckus H550
  • Ruckus M510
  • Ruckus M510-jp
  • Ruckus R310
  • Ruckus R320
  • Ruckus R350
  • Ruckus R350e
  • Ruckus R510
  • Ruckus R550
  • Ruckus R560
  • Ruckus R610
  • Ruckus R650
  • Ruckus R670
  • Ruckus R710
  • Ruckus R720
  • Ruckus R730
  • Ruckus R750
  • Ruckus R760
  • Ruckus R770
  • Ruckus R850
  • Ruckus T310c
  • Ruckus T310n
  • Ruckus T310s
  • Ruckus T350c
  • Ruckus T350d
  • Ruckus T350se
  • Ruckus T610
  • Ruckus T670
  • Ruckus T710
  • Ruckus T710s
  • Ruckus T750
  • Ruckus T750se
  • Ruckus T811-cm
  • Ruckus T811-cm \(non-sfp\)
  • Zonedirector 1200
Ruckuswireless
  • Ruckus Unleashed
  • Ruckus Zonedirector
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-46121.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact