The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a command execution service on TCP port 2004 running with root privileges. Authentication to this service relies on a hardcoded Time-based One-Time Password (TOTP) secret and an embedded static token. An attacker who extracts these credentials from the appliance or a compromised device can generate valid authentication tokens and execute arbitrary OS commands with root privileges, resulting in complete system compromise.
Metrics
Affected Vendors & Products
References
History
Fri, 09 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 09 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a command execution service on TCP port 2004 running with root privileges. Authentication to this service relies on a hardcoded Time-based One-Time Password (TOTP) secret and an embedded static token. An attacker who extracts these credentials from the appliance or a compromised device can generate valid authentication tokens and execute arbitrary OS commands with root privileges, resulting in complete system compromise. | |
| Title | Ruckus vRIoT IoT Controller < 3.0.0.0 Hardcoded Tokens RCE | |
| Weaknesses | CWE-306 CWE-798 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-09T18:37:55.088Z
Reserved: 2026-01-08T20:48:39.252Z
Link: CVE-2025-69425
Updated: 2026-01-09T17:48:43.489Z
Status : Received
Published: 2026-01-09T17:15:53.847
Modified: 2026-01-09T17:15:53.847
Link: CVE-2025-69425
No data.
OpenCVE Enrichment
No data.