Overview
The cybersecurity world is once again abuzz with a freshly discovered vulnerability, CVE-2025-46120, that plagues CommScope Ruckus Unleashed and ZoneDirector platforms. This critical vulnerability allows a remote unauthenticated attacker to execute arbitrary code on the controller, potentially leading to system compromise and data leakage.
The severity of this vulnerability is not to be underestimated since it affects a wide range of enterprise-grade wireless systems. These devices are often used in environments where network security is paramount, such as commercial businesses, government facilities, and educational institutions. With the ability to exploit this vulnerability, attackers could potentially disrupt the operations of these organizations, leading to significant data and financial losses.
Vulnerability Summary
CVE ID: CVE-2025-46120
Severity: Critical (9.8/10 on the CVSS scale)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise, Data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
CommScope Ruckus Unleashed | Prior to 200.15.6.212.27 and 200.18.7.1.323
Ruckus ZoneDirector | Prior to 10.5.1.0.282
How the Exploit Works
The vulnerability lies within the web interface of the affected Ruckus platforms. Specifically, a path-traversal flaw allows the server to execute attacker-supplied EJS templates outside of the permitted directories. An attacker can upload a malicious template, for example, via FTP, to the server. Once uploaded, the server can be tricked into executing this template, which could contain arbitrary code, leading to privilege escalation and potential system compromise.
Conceptual Example Code
A conceptual example of how this vulnerability might be exploited is given below:
ftp target.example.com
Name (target.example.com:attacker): anonymous
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> put malicious.ejs /path/to/vulnerable/directory
200 PORT command successful. Consider using PASV.
150 Ok to send data.
226 Transfer complete.
ftp> bye
221 Goodbye.
In this example, an attacker anonymously logs into the FTP server of the target device and uploads a malicious EJS template (`malicious.ejs`) to a vulnerable directory on the server. The server, due to the path-traversal flaw, can then execute the malicious template, leading to a potential system compromise.