Raisecomm RAX701-GC Series
Plan PatchCVSS 9.8ICS-CERT ICSA-25-294-06Oct 21, 2025
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
A critical authentication bypass vulnerability (CWE-288) in RaiseComm RAX701-GC wireless devices allows remote attackers to gain unauthenticated root shell access. Affected firmware versions include RAX701-GC-WP-01 P200R002C52 (firmware 5.5.27_20190111) and P200R002C53 (firmware 5.5.13_20180720 through 5.5.36_20190709). RaiseComm has not responded to CISA mitigation requests and has not provided a security patch for this issue.
What this means
What could happen
An unauthenticated attacker with network access to an affected RAX701-GC device could bypass authentication and gain root-level command execution, allowing them to modify network routing, traffic filtering, or shutdown the device entirely.
Who's at risk
Network equipment manufacturers and operators deploying RaiseComm RAX701-GC wireless access points or gateways in industrial and enterprise networks should be aware that these devices may be remotely compromised without authentication. This affects any organization using these devices in critical infrastructure, utilities, manufacturing, or remote site connectivity applications.
How it could be exploited
An attacker connects to the device over the network, sends a specially crafted request that bypasses the authentication mechanism (CWE-288), and gains unauthenticated root shell access. From there, the attacker can execute arbitrary commands on the device.
Prerequisites
- Network access to the RAX701-GC device over the network
- No valid credentials required
remotely exploitableno authentication requiredlow complexityno patch availabledefault credentials
Exploitability
Unlikely to be exploited — EPSS score 0.1%
Affected products (2)
2 EOL
ProductAffected VersionsFix Status
RAX701-GC-WP-01 P200R002C52: Firmware__5.5.27_20190111Firmware 5.5.27 20190111No fix (EOL)
RAX701-GC-WP-01 P200R002C53: 5.5.13_20180720|5.5.36_201907095.5.13 20180720|5.5.36 20190709No fix (EOL)
Remediation & Mitigation
0/4
Do now
0/2WORKAROUNDImmediately restrict network access to affected RAX701-GC devices by implementing firewall rules to block inbound traffic from untrusted networks or the internet
HARDENINGIsolate the affected RAX701-GC device from business networks and the internet; place it behind a firewall on a dedicated management network with restricted access
Schedule — requires maintenance window
0/2Patching may require device reboot — plan for process interruption
HARDENINGIf remote access to the device is required, deploy a VPN to provide authenticated, encrypted access; ensure the VPN endpoint is kept current with security updates
WORKAROUNDContact RaiseComm customer support to determine if a security fix is available or if you should plan to replace affected devices
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/63af18b3-4caa-4a0d-8211-60189a7496e0Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.