Command Execution Vulnerability in Ruckus vRIoT IoT Controller
CVE-2025-69425

10CRITICAL

Key Information:

Vendor
CVE Published:
9 January 2026

What is CVE-2025-69425?

The Ruckus vRIoT IoT Controller contains a serious command execution vulnerability due to the exposure of a service on TCP port 2004 which runs with root privileges. This service relies on authentication that uses a hardcoded Time-based One-Time Password (TOTP) secret along with an embedded static token. If an attacker successfully retrieves these credentials from the IoT controller or related compromised devices, they can generate valid authentication tokens that enable them to execute arbitrary operating system commands with root access, leading to a total compromise of the system.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

vRIoT IoT Controller 2.3.0.0 (GA) < 3.0.0.0 (GA)

vRIoT IoT Controller 2.3.1.0 (MR) < 3.0.0.0 (GA)

vRIoT IoT Controller 2.4.0.0 (GA) < 3.0.0.0 (GA)

References

CVSS V4

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ivan Racic
.