Friday, March 7, 2025
HomeComputer Security3 Critical RCE Vulnerability That Affects Ruckus Wireless Routers Let Hackers Exploit...

3 Critical RCE Vulnerability That Affects Ruckus Wireless Routers Let Hackers Exploit the Routers Remotely

Published on

SIEM as a Service

Follow Us on Google News

A security researcher discovered a 3 critical remote code execution vulnerabilities in Ruckus Wireless routers let malicious hackers bypass the routers and take control of it remotely.

Ruckus Networks are known as selling wired and wireless networking equipment and software.

The vulnerabilities are discovered in the web-based interface allow attackers to exploit the router without a password and take complete control over the internet.

The exploitation used by various vulnerabilities such as information leak, authentication bypass, command injection, path traversal, stack overflow, and arbitrary file read/write.

The vulnerability allows gaining the root access on the Routers, but it is very difficult to exploit since the exploitation coordinating with 3 different severe vulnerabilities.

During the research, researchers examined the 33 different access points firmware and concluded that all of them were vulnerable to remote code execution vulnerability.

By taking control of the vulnerable router, attackers can monitor the unencrypted traffic on the enterprise network and redirect the user to a malicious website where they can drop the malware and also steal sensitive information such as user name and password using phishing attacks.

Gal Zror, a researcher who finds the vulnerabilities demonstrates the 3 remote code executions in Ruckus Wireless Routers, and the techniques used to find and exploit them in the annual Chaos Communication Congress conference.

According to finding report, The Demonstrations includes the following:

  • It overviews Ruckus Wireless Routers equipment and their attack surfaces. Explain the firmware analysis and emulation prosses using our dockerized QEMU full system framework.
  • -Demonstrate the first RCE and its specifics. Describe the webserver logic using the Ghidra decompiler and its scripting environment.
  • -Demonstrate the second RCE using stack overflow vulnerability.
  • -Lastly, demonstrate the third RCE by using a vulnerability chaining technique.
  • All Tools used in this research will be published.

According to Ruckus spokesperson Aharon Etengoff “By design, our devices do not fetch and install software automatically to ensure our customers can manage their networks appropriately,”

Released fixed the bugs and released a new  200.7.10.202.92 software update and highly recommend their customers to update their router and apply the patch.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Implementing Identity First Security for Zero Trust Architectures

Zero Trust is a security framework that operates under the assumption that no implicit...

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Implementing Identity First Security for Zero Trust Architectures

Zero Trust is a security framework that operates under the assumption that no implicit...

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...