Loading
Generated remediation guidance and an executive summary. No account required.
An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, where the authenticated diagnostics API endpoint `/admin/_cmdstat.jsp` passes attacker-controlled input to the shell without adequate validation, enabling a remote attacker to specify a target by MAC address and execute arbitrary commands as root.
Use CWE-77, Ruckuswireless vendor hub and Ruckus Unleashed product page to widen CVE-2025-46122 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-46121, CVE-2025-46120 and CVE-2025-46117 for nearby disclosures in the same product family.