Saturday, May 10, 2025
HomeComputer Security3 Critical RCE Vulnerability That Affects Ruckus Wireless Routers Let Hackers Exploit...

3 Critical RCE Vulnerability That Affects Ruckus Wireless Routers Let Hackers Exploit the Routers Remotely

Published on

SIEM as a Service

Follow Us on Google News

A security researcher discovered a 3 critical remote code execution vulnerabilities in Ruckus Wireless routers let malicious hackers bypass the routers and take control of it remotely.

Ruckus Networks are known as selling wired and wireless networking equipment and software.

The vulnerabilities are discovered in the web-based interface allow attackers to exploit the router without a password and take complete control over the internet.

- Advertisement - Google News

The exploitation used by various vulnerabilities such as information leak, authentication bypass, command injection, path traversal, stack overflow, and arbitrary file read/write.

The vulnerability allows gaining the root access on the Routers, but it is very difficult to exploit since the exploitation coordinating with 3 different severe vulnerabilities.

During the research, researchers examined the 33 different access points firmware and concluded that all of them were vulnerable to remote code execution vulnerability.

By taking control of the vulnerable router, attackers can monitor the unencrypted traffic on the enterprise network and redirect the user to a malicious website where they can drop the malware and also steal sensitive information such as user name and password using phishing attacks.

Gal Zror, a researcher who finds the vulnerabilities demonstrates the 3 remote code executions in Ruckus Wireless Routers, and the techniques used to find and exploit them in the annual Chaos Communication Congress conference.

According to finding report, The Demonstrations includes the following:

  • It overviews Ruckus Wireless Routers equipment and their attack surfaces. Explain the firmware analysis and emulation prosses using our dockerized QEMU full system framework.
  • -Demonstrate the first RCE and its specifics. Describe the webserver logic using the Ghidra decompiler and its scripting environment.
  • -Demonstrate the second RCE using stack overflow vulnerability.
  • -Lastly, demonstrate the third RCE by using a vulnerability chaining technique.
  • All Tools used in this research will be published.

According to Ruckus spokesperson Aharon Etengoff “By design, our devices do not fetch and install software automatically to ensure our customers can manage their networks appropriately,”

Released fixed the bugs and released a new  200.7.10.202.92 software update and highly recommend their customers to update their router and apply the patch.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

How to Detecting Backdoors in Enterprise Networks

In today’s rapidly evolving cybersecurity landscape, enterprise networks face a particularly insidious threat: backdoors,...

Securing Windows Endpoints Using Group Policy Objects (GPOs): A Configuration Guide

Securing Windows endpoints is a top priority for organizations seeking to protect sensitive data...

Bluetooth Core 6.1 Released – What’s New!

Bluetooth SIG’s decision to transition to a bi-annual release cadence marks a strategic pivot...

Chrome 137 Integrates Gemini Nano AI to Combat Tech Support Scams

Google has unveiled a groundbreaking defense mechanism in Chrome 137, integrating its on-device Gemini...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Bluetooth Core 6.1 Released – What’s New!

Bluetooth SIG’s decision to transition to a bi-annual release cadence marks a strategic pivot...

Chrome 137 Integrates Gemini Nano AI to Combat Tech Support Scams

Google has unveiled a groundbreaking defense mechanism in Chrome 137, integrating its on-device Gemini...

DOGE Employee Computer Infected with Malware and Leaked Data Found Info-Stealer Logs

Kyle Schutt, a 37-year-old DOGE employee identified in federal payroll records, has had his...