{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T23:33:30.871","vulnerabilities":[{"cve":{"id":"CVE-2025-44961","sourceIdentifier":"cve@mitre.org","published":"2025-08-04T17:15:30.210","lastModified":"2025-11-03T20:19:04.147","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build, OS command injection can occur via an IP address field provided by an authenticated user."},{"lang":"es","value":"En RUCKUS SmartZone (SZ) anterior a la versión de actualización 6.1.2p3, la inyección de comandos del sistema operativo puede ocurrir a través de un campo de dirección IP proporcionado por un usuario autenticado."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:commscope:ruckus_smartzone_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.2","matchCriteriaId":"44F784A1-3FFC-4D0D-AA1C-79FC658C3427"},{"vulnerable":true,"criteria":"cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:-:*:*:*:*:*:*","matchCriteriaId":"03388446-4CF1-44E7-B065-C2757F1FB268"},{"vulnerable":true,"criteria":"cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p2:*:*:*:*:*:*","matchCriteriaId":"E24AB619-53C8-4D85-B7F4-3DD539CE4423"},{"vulnerable":true,"criteria":"cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p3:*:*:*:*:*:*","matchCriteriaId":"C27F9A43-95AD-447E-AA4F-1E76AEC465B7"},{"vulnerable":true,"criteria":"cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.0.0:*:*:*:*:*:*:*","matchCriteriaId":"8A03C572-D1A0-4C4A-A57B-6A7272A656CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.1.0:*:*:*:*:*:*:*","matchCriteriaId":"656A9814-B5F2-40C7-BC9E-E3F94873955E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:commscope:ruckus_virtual_smartzone:-:*:*:*:*:*:*:*","matchCriteriaId":"4279B64A-E14F-4C35-833E-1BE754BA938A"},{"vulnerable":false,"criteria":"cpe:2.3:a:commscope:ruckus_virtual_smartzone-federal:-:*:*:*:*:*:*:*","matchCriteriaId":"CE5F3960-145C-4263-9758-7E8F23697728"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_c110:-:*:*:*:*:*:*:*","matchCriteriaId":"84B1EC30-ACC3-4141-A149-F2C912AEDC2B"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_e510:-:*:*:*:*:*:*:*","matchCriteriaId":"C1CB277A-B51A-4EF6-9B60-26E42DB466A3"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_h320:-:*:*:*:*:*:*:*","matchCriteriaId":"4EDE59EC-811F-4A5E-A4DE-C3289D8A049A"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_h350:-:*:*:*:*:*:*:*","matchCriteriaId":"37C8E333-5C44-44BB-842F-FCDA8D8D5831"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_h510:-:*:*:*:*:*:*:*","matchCriteriaId":"0CABADA0-2CC3-4218-BE64-7014F21166CD"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_m510:-:*:*:*:*:*:*:*","matchCriteriaId":"75F9B4E2-6E5B-4C96-A46F-06450BB81E68"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_r320:-:*:*:*:*:*:*:*","matchCriteriaId":"D165B27E-AA69-446F-916F-AF26E30510CA"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_r510:-:*:*:*:*:*:*:*","matchCriteriaId":"EB605D38-A71B-44FF-909D-D34348491EA8"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_r560:-:*:*:*:*:*:*:*","matchCriteriaId":"E547E2A0-86E7-438C-9602-A2ECB247A84C"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_r610:-:*:*:*:*:*:*:*","matchCriteriaId":"A3A5E2C5-E261-4FA6-AB5E-D651110C80CB"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_r710:-:*:*:*:*:*:*:*","matchCriteriaId":"22845768-F360-46EC-BB48-2A68A4B6A2C8"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_r720:-:*:*:*:*:*:*:*","matchCriteriaId":"89E38958-2FEB-4945-81E0-522BD1136D26"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_r730:-:*:*:*:*:*:*:*","matchCriteriaId":"5D8F47E7-791A-44E8-A62C-B4D0F4AF80BD"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_r750:-:*:*:*:*:*:*:*","matchCriteriaId":"4A2A5668-2EDB-4E93-A4FA-88FCBCC057B1"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_smartzone_100:-:*:*:*:*:*:*:*","matchCriteriaId":"B47D9D0D-0FB1-4E47-9249-A82EC9581198"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_smartzone_100-d:-:*:*:*:*:*:*:*","matchCriteriaId":"C02B87AD-DEEA-4041-B5BC-CDF208208619"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_smartzone_144:-:*:*:*:*:*:*:*","matchCriteriaId":"E724D3AC-394D-4413-8CCE-AC288221A491"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_smartzone_144-federal:-:*:*:*:*:*:*:*","matchCriteriaId":"3C0CB514-5AA1-4051-8C0E-FF9B1279EC7D"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_smartzone_300:-:*:*:*:*:*:*:*","matchCriteriaId":"E4AE1274-1D3E-4357-BA8D-073E37F56738"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_smartzone_300-federal:-:*:*:*:*:*:*:*","matchCriteriaId":"D7A47BFA-B68B-475B-AB3B-5E5C083BC907"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_t310c:-:*:*:*:*:*:*:*","matchCriteriaId":"0777F3E0-7F95-49B4-B488-5550FF922E9E"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_t310d:-:*:*:*:*:*:*:*","matchCriteriaId":"07675BAE-5475-4F6C-9229-65BD92338F5B"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_t310n:-:*:*:*:*:*:*:*","matchCriteriaId":"23A4DF46-52A7-4F47-B9EB-8F3A1D0261DA"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_t310s:-:*:*:*:*:*:*:*","matchCriteriaId":"DD0D8BF0-5736-44F7-8B9C-6BDCF97FF5C9"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_t350se:-:*:*:*:*:*:*:*","matchCriteriaId":"3B4ED697-139A-4679-85D5-3992DEA8BB44"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_t750:-:*:*:*:*:*:*:*","matchCriteriaId":"29911530-47EC-4865-9965-72D101827F1A"},{"vulnerable":false,"criteria":"cpe:2.3:h:commscope:ruckus_t750se:-:*:*:*:*:*:*:*","matchCriteriaId":"5C83392A-1656-473F-9F08-C3CC89FDF3FA"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:commscope:ruckus_network_director:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.0.51","matchCriteriaId":"BA45EF06-28C7-41D8-BBAC-671095FB29A5"}]}]}],"references":[{"url":"https://claroty.com/team82/disclosure-dashboard/cve-2025-44961","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://kb.cert.org/vuls/id/613753","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://www.kb.cert.org/vuls/id/613753","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}