Raisecomm’s Security Snafu: Remote Access Blunder Leaves Devices Vulnerable!
Raisecomm’s RAX701-GC devices have a security flaw that lets remote attackers bypass authentication and gain root access. The vulnerability, with a CVSS v4 score of 9.3, allows SSH sessions without credentials. Raisecomm hasn’t responded to mitigation requests. Stay safe by securing your network and using updated VPNs. View CSAF for more details.

Hot Take:
When your firmware is as solid as a wet noodle, even the best hackers won’t need to break a sweat. Raisecomm’s devices have turned into welcome mats for cyber bandits who can now waltz in through the front door, bypassing authentication like it’s a velvet rope at a VIP club. Time to patch up that hole, Raisecomm, or your devices might just end up being the talk of the hacker town!
Key Points:
– Raisecomm devices are vulnerable to authentication bypass.
– CVE-2025-11534 has a CVSS v4 score of 9.3: Highly severe.
– Vulnerability allows attackers remote root shell access.
– Raisecomm hasn’t cooperated with CISA to mitigate the issue.
– CISA provides mitigation strategies, but no public exploit reported yet.
