fkie_cve-2025-63735
Vulnerability from fkie_nvd
Published
2025-11-25 22:15
Modified
2025-12-30 16:35
Severity ?
Summary
A reflected Cross site scripting (XSS) vulnerability in Ruckus Unleashed 200.13.6.1.319 via the name parameter to the the captive-portal endpoint selfguestpass/guestAccessSubmit.jsp.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r770_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "BF81CF2D-A11B-4195-B22A-673276566428",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r770:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8239367-AEE8-423F-BC64-679AC2FAF927",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r670_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "293DCF6F-ECF4-4985-8955-2220CC9D8E87",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA5470FB-90BC-49D9-9E8F-4BB28E7BCA12",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r370_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "29EC5E1F-17C7-4FF9-A691-64BD68107A67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC73F4FB-D887-4AC0-9608-A441042C19E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r850_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8076B8-E7B3-4899-A673-7BE7DD1B6186",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46DF836A-ED86-4A19-8595-17645859F743",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r750_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9ED5C6-542E-45CA-881E-48366833D4C4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DE5EC57-07AE-4594-B69E-B666751FEA72",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r650_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D3B9F7-1F87-493A-BF5C-3D2A8B0934F2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03053ED5-8EFB-4F12-BC9B-ABD12C063252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r550_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "71356513-4AFC-42B6-AD4C-9D09E27F41D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F49D1B-F585-430F-9993-EE531C2B9ACB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r350_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "411801C9-CDEB-42F2-B028-9C2B2189B6B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C18AFFA4-F8D7-41FD-AAB4-3186FB313248",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_r350e_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "BA40226F-5025-4A0F-B5A8-6E2FDD462AE4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_r350e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F19EFC9-3609-4EC5-AC43-44FD287C63B4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t670_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "84CBD090-00A9-42E0-A7BB-4B90A4D55ADE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD823CE3-D3AD-4A78-B6C5-DDC969E26A5A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t670sn_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "35290058-7230-4385-84B3-E391CF159DCE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t670sn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A40BFA-72B6-45C4-BF1D-D9C650BDDF36",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t750_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "68A260AA-66F5-4F38-886B-6DE7B0322E33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4520C8DD-2131-4E59-A44D-CA9A90F28DA0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t750se_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "486B3F9E-18C7-4929-9E2F-284A21093A97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t750se:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD0E86D8-171E-4B2B-8597-78E7C5666894",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t350c_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "F4FC9968-A4BC-42F8-838B-538B01EF577E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t350c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3638A20C-5618-4865-B3E0-7F957E684C1F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t350d_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "76A0D71E-720B-4458-8493-93364EEF7442",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t350d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A36E50-A8AF-4565-84A9-D6CFABB9B2D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_t350se_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F6D6AB-7874-4FE5-BD79-5BAADAC97FCD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_t350se:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69203961-038C-4514-BB8A-F32436816668",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_h550_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "CB74F4C7-5160-4784-8ABE-3476E8E5B7C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_h550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C36FE505-2B49-4ADE-B0F0-D3BB1A075786",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckusnetworks:unleashed_h350_firmware:200.13.6.1.319:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE39DFB-13CC-4A80-BE72-A437879219FE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckusnetworks:unleashed_h350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71AE9A32-D55A-40E0-A9F5-CAFE7154BB78",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A reflected Cross site scripting (XSS) vulnerability in Ruckus Unleashed 200.13.6.1.319 via the name parameter to the the captive-portal endpoint selfguestpass/guestAccessSubmit.jsp."
}
],
"id": "CVE-2025-63735",
"lastModified": "2025-12-30T16:35:33.290",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-11-25T22:15:47.860",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/huthx/CVE-2025-63735-Ruckus-Unleashed-Reflected-XSS"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.ruckusnetworks.com/products/network-control-and-management/controller-less/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…