The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a command execution service on TCP port 2004 running with root privileges. Authentication to this service relies on a hardcoded Time-based One-Time Password (TOTP) secret and an embedded static token. An attacker who extracts these credentials from the appliance or a compromised device can generate valid authentication tokens and execute arbitrary OS commands with root privileges, resulting in complete system compromise.
History

Fri, 09 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
Description The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a command execution service on TCP port 2004 running with root privileges. Authentication to this service relies on a hardcoded Time-based One-Time Password (TOTP) secret and an embedded static token. An attacker who extracts these credentials from the appliance or a compromised device can generate valid authentication tokens and execute arbitrary OS commands with root privileges, resulting in complete system compromise.
Title Ruckus vRIoT IoT Controller < 3.0.0.0 Hardcoded Tokens RCE
Weaknesses CWE-306
CWE-798
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-09T18:37:55.088Z

Reserved: 2026-01-08T20:48:39.252Z

Link: CVE-2025-69425

cve-icon Vulnrichment

Updated: 2026-01-09T17:48:43.489Z

cve-icon NVD

Status : Received

Published: 2026-01-09T17:15:53.847

Modified: 2026-01-09T17:15:53.847

Link: CVE-2025-69425

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.