Remotely Exploitable Vulnerability in Ruckus vRIoT IoT Controller Firmware
CVE-2025-69426

10CRITICAL

Key Information:

Vendor
CVE Published:
9 January 2026

What is CVE-2025-69426?

The Ruckus vRIoT IoT Controller firmware prior to version 3.0.0.0 (GA) is vulnerable due to hardcoded credentials embedded in an initialization script. The SSH service is exposed to the network without adequate IP-based restrictions, allowing an attacker to gain unauthorized access. Even with configurations that disable SCP and pseudo-TTY allocation, an attacker can utilize the hardcoded credentials to authenticate, enabling SSH local port forwarding and gaining access to the Docker socket. This vulnerability permits the attacker to mount the host filesystem via Docker, potentially escaping the container and executing arbitrary commands as root on the vRIoT controller, leading to complete compromise of the system.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

vRIoT IOT Controller 2.3.0.0 (GA) < 3.0.0.0 (GA)

vRIoT IOT Controller 2.3.1.0 (MR) < 3.0.0.0 (GA)

vRIoT IOT Controller 2.4.0.0 (GA) < 3.0.0.0 (GA)

References

CVSS V4

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ivan Racic
.