Command Execution Vulnerability in Ruckus vRIoT IoT Controller
CVE-2025-69425
What is CVE-2025-69425?
The Ruckus vRIoT IoT Controller contains a serious command execution vulnerability due to the exposure of a service on TCP port 2004 which runs with root privileges. This service relies on authentication that uses a hardcoded Time-based One-Time Password (TOTP) secret along with an embedded static token. If an attacker successfully retrieves these credentials from the IoT controller or related compromised devices, they can generate valid authentication tokens that enable them to execute arbitrary operating system commands with root access, leading to a total compromise of the system.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
vRIoT IoT Controller 2.3.0.0 (GA) < 3.0.0.0 (GA)
vRIoT IoT Controller 2.3.1.0 (MR) < 3.0.0.0 (GA)
vRIoT IoT Controller 2.4.0.0 (GA) < 3.0.0.0 (GA)
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved
