CVE-2025-46120

9.8 CRITICAL

📋 TL;DR

A path traversal vulnerability in Ruckus Unleashed and ZoneDirector web interfaces allows unauthenticated attackers to execute arbitrary EJS template code by uploading malicious templates via FTP. This enables privilege escalation and remote code execution on affected network controllers. Organizations using vulnerable versions of these wireless network management systems are at risk.

💻 Affected Systems

Products:
  • CommScope Ruckus Unleashed
  • Ruckus ZoneDirector
Versions: Ruckus Unleashed prior to 200.15.6.212.27 and 200.18.7.1.323; ZoneDirector prior to 10.5.1.0.282
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires FTP access to upload templates, but web interface is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the network controller leading to full administrative control, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Attacker gains administrative privileges on the controller, modifies network configurations, intercepts traffic, and potentially compromises connected devices.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the controller system itself without lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit chain requires FTP access for template upload followed by web interface path traversal. Public technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Ruckus Unleashed 200.15.6.212.27 or 200.18.7.1.323; ZoneDirector 10.5.1.0.282

Vendor Advisory: https://support.ruckuswireless.com/security_bulletins/330

Restart Required: Yes

Instructions:

1. Download latest firmware from Ruckus support portal. 2. Backup current configuration. 3. Upload firmware via web interface. 4. Apply update. 5. Reboot controller. 6. Verify version after reboot.

🔧 Temporary Workarounds

Disable FTP Service

all

Prevents template upload via FTP, breaking the exploit chain

Check Ruckus documentation for FTP disable procedure

Network Segmentation

all

Restrict access to controller management interfaces

Configure firewall rules to limit access to trusted IPs only

🧯 If You Can't Patch

  • Isolate controller management interfaces behind firewall with strict access controls
  • Disable FTP service and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface under System > About or via CLI 'show version'

Check Version:

show version

Verify Fix Applied:

Confirm version is equal to or higher than patched versions listed in fix_official section

📡 Detection & Monitoring

Log Indicators:

  • Unusual FTP uploads of .ejs files
  • Web interface requests with path traversal patterns
  • Unauthorized configuration changes

Network Indicators:

  • Unexpected FTP connections to controller
  • Suspicious web requests with '../' patterns

SIEM Query:

source="ruckus_controller" AND (uri="*../*" OR filename="*.ejs")

🔗 References

📤 Share & Export