fkie_cve-2025-63735
Vulnerability from fkie_nvd
Published
2025-11-25 22:15
Modified
2025-12-30 16:35
Summary
A reflected Cross site scripting (XSS) vulnerability in Ruckus Unleashed 200.13.6.1.319 via the name parameter to the the captive-portal endpoint selfguestpass/guestAccessSubmit.jsp.
Impacted products
Vendor Product Version
ruckusnetworks unleashed_r770_firmware 200.13.6.1.319
ruckusnetworks unleashed_r770 -
ruckusnetworks unleashed_r670_firmware 200.13.6.1.319
ruckusnetworks unleashed_r670 -
ruckusnetworks unleashed_r370_firmware 200.13.6.1.319
ruckusnetworks unleashed_r370 -
ruckusnetworks unleashed_r850_firmware 200.13.6.1.319
ruckusnetworks unleashed_r850 -
ruckusnetworks unleashed_r750_firmware 200.13.6.1.319
ruckusnetworks unleashed_r750 -
ruckusnetworks unleashed_r650_firmware 200.13.6.1.319
ruckusnetworks unleashed_r650 -
ruckusnetworks unleashed_r550_firmware 200.13.6.1.319
ruckusnetworks unleashed_r550 -
ruckusnetworks unleashed_r350_firmware 200.13.6.1.319
ruckusnetworks unleashed_r350 -
ruckusnetworks unleashed_r350e_firmware 200.13.6.1.319
ruckusnetworks unleashed_r350e -
ruckusnetworks unleashed_t670_firmware 200.13.6.1.319
ruckusnetworks unleashed_t670 -
ruckusnetworks unleashed_t670sn_firmware 200.13.6.1.319
ruckusnetworks unleashed_t670sn -
ruckusnetworks unleashed_t750_firmware 200.13.6.1.319
ruckusnetworks unleashed_t750 -
ruckusnetworks unleashed_t750se_firmware 200.13.6.1.319
ruckusnetworks unleashed_t750se -
ruckusnetworks unleashed_t350c_firmware 200.13.6.1.319
ruckusnetworks unleashed_t350c -
ruckusnetworks unleashed_t350d_firmware 200.13.6.1.319
ruckusnetworks unleashed_t350d -
ruckusnetworks unleashed_t350se_firmware 200.13.6.1.319
ruckusnetworks unleashed_t350se -
ruckusnetworks unleashed_h550_firmware 200.13.6.1.319
ruckusnetworks unleashed_h550 -
ruckusnetworks unleashed_h350_firmware 200.13.6.1.319
ruckusnetworks unleashed_h350 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r770_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF81CF2D-A11B-4195-B22A-673276566428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r770:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8239367-AEE8-423F-BC64-679AC2FAF927",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r670_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "293DCF6F-ECF4-4985-8955-2220CC9D8E87",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA5470FB-90BC-49D9-9E8F-4BB28E7BCA12",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r370_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "29EC5E1F-17C7-4FF9-A691-64BD68107A67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC73F4FB-D887-4AC0-9608-A441042C19E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r850_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B8076B8-E7B3-4899-A673-7BE7DD1B6186",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46DF836A-ED86-4A19-8595-17645859F743",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r750_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D9ED5C6-542E-45CA-881E-48366833D4C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE5EC57-07AE-4594-B69E-B666751FEA72",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r650_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D3B9F7-1F87-493A-BF5C-3D2A8B0934F2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03053ED5-8EFB-4F12-BC9B-ABD12C063252",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r550_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "71356513-4AFC-42B6-AD4C-9D09E27F41D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2F49D1B-F585-430F-9993-EE531C2B9ACB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r350_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "411801C9-CDEB-42F2-B028-9C2B2189B6B4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C18AFFA4-F8D7-41FD-AAB4-3186FB313248",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r350e_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA40226F-5025-4A0F-B5A8-6E2FDD462AE4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r350e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F19EFC9-3609-4EC5-AC43-44FD287C63B4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t670_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "84CBD090-00A9-42E0-A7BB-4B90A4D55ADE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD823CE3-D3AD-4A78-B6C5-DDC969E26A5A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t670sn_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "35290058-7230-4385-84B3-E391CF159DCE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t670sn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6A40BFA-72B6-45C4-BF1D-D9C650BDDF36",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t750_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "68A260AA-66F5-4F38-886B-6DE7B0322E33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4520C8DD-2131-4E59-A44D-CA9A90F28DA0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t750se_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "486B3F9E-18C7-4929-9E2F-284A21093A97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t750se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD0E86D8-171E-4B2B-8597-78E7C5666894",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t350c_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4FC9968-A4BC-42F8-838B-538B01EF577E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t350c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638A20C-5618-4865-B3E0-7F957E684C1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t350d_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "76A0D71E-720B-4458-8493-93364EEF7442",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t350d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A36E50-A8AF-4565-84A9-D6CFABB9B2D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t350se_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F6D6AB-7874-4FE5-BD79-5BAADAC97FCD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t350se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69203961-038C-4514-BB8A-F32436816668",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_h550_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB74F4C7-5160-4784-8ABE-3476E8E5B7C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_h550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36FE505-2B49-4ADE-B0F0-D3BB1A075786",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckusnetworks:unleashed_h350_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE39DFB-13CC-4A80-BE72-A437879219FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckusnetworks:unleashed_h350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71AE9A32-D55A-40E0-A9F5-CAFE7154BB78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A reflected Cross site scripting (XSS) vulnerability in Ruckus Unleashed 200.13.6.1.319 via the name parameter to the the captive-portal endpoint selfguestpass/guestAccessSubmit.jsp."
    }
  ],
  "id": "CVE-2025-63735",
  "lastModified": "2025-12-30T16:35:33.290",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-11-25T22:15:47.860",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/huthx/CVE-2025-63735-Ruckus-Unleashed-Reflected-XSS"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://www.ruckusnetworks.com/products/network-control-and-management/controller-less/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…