Critical severity9.8NVD Advisory· Published Feb 19, 2026· Updated Apr 3, 2026
CVE-2025-67304
CVE-2025-67304
Description
In Ruckus Network Director (RND) < 4.5.0.54, the OVA appliance contains hardcoded credentials for the ruckus PostgreSQL database user. In the default configuration, the PostgreSQL service is accessible over the network on TCP port 5432. An attacker can use the hardcoded credentials to authenticate remotely, gaining superuser access to the database. This allows creation of administrative users for the web interface, extraction of password hashes, and execution of arbitrary OS commands.
Affected products
1- cpe:2.3:a:commscope:ruckus_network_director:*:*:*:*:*:*:*:*Range: <4.5.0.56
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/marlinkcyber/advisories/blob/main/advisories/MCSAID-2025-009-ruckus-nd-hardcoded-postgresql-credentials-rce.mdnvdExploitThird Party Advisory
- webresources.commscope.com/download/assets/RUCKUS+Network+Director%3A+Critical+Security+Bypass+Vulnerability+Leading+to+Remote+Code+Execution+and/3adeb3acb69211f08a46b6532db37357nvdVendor Advisory
News mentions
0No linked articles in our index yet.