Vulnerabilites related to ruckuswireless - t710s
Vulnerability from fkie_nvd
Published
2020-07-28 15:15
Modified
2024-11-21 05:02
Severity ?
Summary
A stack buffer overflow in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | unleashed_firmware | * | |
ruckuswireless | c110 | - | |
ruckuswireless | e510 | - | |
ruckuswireless | h320 | - | |
ruckuswireless | h510 | - | |
ruckuswireless | m510 | - | |
ruckuswireless | r310 | - | |
ruckuswireless | r320 | - | |
ruckuswireless | r500 | - | |
ruckuswireless | r510 | - | |
ruckuswireless | r600 | - | |
ruckuswireless | r610 | - | |
ruckuswireless | r710 | - | |
ruckuswireless | r720 | - | |
ruckuswireless | r750 | - | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s | - | |
ruckuswireless | t310c | - | |
ruckuswireless | t310d | - | |
ruckuswireless | t310n | - | |
ruckuswireless | t310s | - | |
ruckuswireless | t610 | - | |
ruckuswireless | t710 | - | |
ruckuswireless | t710s | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:unleashed_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C6FE6A-B160-4C64-B900-9F5637EE2EF4", "versionEndIncluding": "200.7.10.102.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77671DB-6197-4C8D-B667-A0081350E5AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack buffer overflow in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." }, { "lang": "es", "value": "Un desbordamiento del b\u00fafer de la pila en webs en Ruckus Wireless Unleashed versiones hasta 200.7.10.102.92, permite a un atacante remoto ejecutar c\u00f3digo por medio de una petici\u00f3n HTTP no autenticada. Esto afecta a los dispositivos C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, y T710" } ], "id": "CVE-2020-13916", "lastModified": "2024-11-21T05:02:08.510", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-28T15:15:11.687", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-28 15:15
Modified
2024-11-21 05:02
Severity ?
Summary
emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to achieve command injection via a crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | unleashed_firmware | * | |
ruckuswireless | c110 | - | |
ruckuswireless | e510 | - | |
ruckuswireless | h320 | - | |
ruckuswireless | h510 | - | |
ruckuswireless | m510 | - | |
ruckuswireless | r310 | - | |
ruckuswireless | r320 | - | |
ruckuswireless | r500 | - | |
ruckuswireless | r510 | - | |
ruckuswireless | r600 | - | |
ruckuswireless | r610 | - | |
ruckuswireless | r710 | - | |
ruckuswireless | r720 | - | |
ruckuswireless | r750 | - | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s | - | |
ruckuswireless | t310c | - | |
ruckuswireless | t310d | - | |
ruckuswireless | t310n | - | |
ruckuswireless | t310s | - | |
ruckuswireless | t610 | - | |
ruckuswireless | t710 | - | |
ruckuswireless | t710s | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:unleashed_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C6FE6A-B160-4C64-B900-9F5637EE2EF4", "versionEndIncluding": "200.7.10.102.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77671DB-6197-4C8D-B667-A0081350E5AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to achieve command injection via a crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." }, { "lang": "es", "value": "emfd/libemf en Ruckus Wireless Unleashed versiones hasta 200.7.10.102.92, permite a un atacante remoto lograr una inyecci\u00f3n de comandos por medio de una petici\u00f3n HTTP dise\u00f1ada. Esto afecta a los dispositivos C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, y T710" } ], "id": "CVE-2020-13919", "lastModified": "2024-11-21T05:02:08.923", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-28T15:15:11.827", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-28 15:15
Modified
2024-11-21 05:02
Severity ?
Summary
webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to cause a denial of service (Segmentation fault) to the webserver via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | unleashed_firmware | * | |
ruckuswireless | c110 | - | |
ruckuswireless | e510 | - | |
ruckuswireless | h320 | - | |
ruckuswireless | h510 | - | |
ruckuswireless | m510 | - | |
ruckuswireless | r310 | - | |
ruckuswireless | r320 | - | |
ruckuswireless | r500 | - | |
ruckuswireless | r510 | - | |
ruckuswireless | r600 | - | |
ruckuswireless | r610 | - | |
ruckuswireless | r710 | - | |
ruckuswireless | r720 | - | |
ruckuswireless | r750 | - | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s | - | |
ruckuswireless | t310c | - | |
ruckuswireless | t310d | - | |
ruckuswireless | t310n | - | |
ruckuswireless | t310s | - | |
ruckuswireless | t610 | - | |
ruckuswireless | t710 | - | |
ruckuswireless | t710s | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:unleashed_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C6FE6A-B160-4C64-B900-9F5637EE2EF4", "versionEndIncluding": "200.7.10.102.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77671DB-6197-4C8D-B667-A0081350E5AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to cause a denial of service (Segmentation fault) to the webserver via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." }, { "lang": "es", "value": "webs en Ruckus Wireless Unleashed versiones hasta 200.7.10.102.92 permite a un atacante remoto causar una denegaci\u00f3n de servicio (error de segmentaci\u00f3n) en el servidor web por medio de una petici\u00f3n HTTP no autenticada. Esto afecta a los dispositivos C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, y T710" } ], "id": "CVE-2020-13914", "lastModified": "2024-11-21T05:02:08.237", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-28T15:15:11.577", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-28 15:15
Modified
2024-11-21 05:02
Severity ?
Summary
Incorrect access control in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to leak system information (that can be used for a jailbreak) via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | unleashed_firmware | * | |
ruckuswireless | c110 | - | |
ruckuswireless | e510 | - | |
ruckuswireless | h320 | - | |
ruckuswireless | h510 | - | |
ruckuswireless | m510 | - | |
ruckuswireless | r310 | - | |
ruckuswireless | r320 | - | |
ruckuswireless | r500 | - | |
ruckuswireless | r510 | - | |
ruckuswireless | r600 | - | |
ruckuswireless | r610 | - | |
ruckuswireless | r710 | - | |
ruckuswireless | r720 | - | |
ruckuswireless | r750 | - | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s | - | |
ruckuswireless | t310c | - | |
ruckuswireless | t310d | - | |
ruckuswireless | t310n | - | |
ruckuswireless | t310s | - | |
ruckuswireless | t610 | - | |
ruckuswireless | t710 | - | |
ruckuswireless | t710s | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:unleashed_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C6FE6A-B160-4C64-B900-9F5637EE2EF4", "versionEndIncluding": "200.7.10.102.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77671DB-6197-4C8D-B667-A0081350E5AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access control in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to leak system information (that can be used for a jailbreak) via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." }, { "lang": "es", "value": "Un control de acceso incorrecto en webs en Ruckus Wireless Unleashed versiones hasta 200.7.10.102.92, permite a un atacante remoto filtrar informaci\u00f3n del sistema (que se puede usar para un jailbreak) por medio de una petici\u00f3n HTTP no autenticada. Esto afecta a los dispositivos C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, y T710" } ], "id": "CVE-2020-13918", "lastModified": "2024-11-21T05:02:08.787", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-28T15:15:11.780", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-28 15:15
Modified
2024-11-21 05:02
Severity ?
Summary
Insecure permissions in emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allow a remote attacker to overwrite admin credentials via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | unleashed_firmware | * | |
ruckuswireless | c110 | - | |
ruckuswireless | e510 | - | |
ruckuswireless | h320 | - | |
ruckuswireless | h510 | - | |
ruckuswireless | m510 | - | |
ruckuswireless | r310 | - | |
ruckuswireless | r320 | - | |
ruckuswireless | r500 | - | |
ruckuswireless | r510 | - | |
ruckuswireless | r600 | - | |
ruckuswireless | r610 | - | |
ruckuswireless | r710 | - | |
ruckuswireless | r720 | - | |
ruckuswireless | r750 | - | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s | - | |
ruckuswireless | t310c | - | |
ruckuswireless | t310d | - | |
ruckuswireless | t310n | - | |
ruckuswireless | t310s | - | |
ruckuswireless | t610 | - | |
ruckuswireless | t710 | - | |
ruckuswireless | t710s | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:unleashed_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C6FE6A-B160-4C64-B900-9F5637EE2EF4", "versionEndIncluding": "200.7.10.102.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77671DB-6197-4C8D-B667-A0081350E5AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure permissions in emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allow a remote attacker to overwrite admin credentials via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." }, { "lang": "es", "value": "Los permisos no seguros en emfd/libemf en Ruckus Wireless Unleashed versiones hasta 200.7.10.102.92, permiten a un atacante remoto sobrescribir las credenciales de administrador por medio de una petici\u00f3n HTTP no autenticada. Esto afecta a los dispositivos C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, y T710" } ], "id": "CVE-2020-13915", "lastModified": "2024-11-21T05:02:08.373", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-28T15:15:11.640", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" }, { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-13 20:15
Modified
2025-08-22 21:09
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/ | Exploit, Third Party Advisory | |
cve@mitre.org | https://support.ruckuswireless.com/security_bulletins/315 | Patch, Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.ruckuswireless.com/security_bulletins/315 | Patch, Product, Vendor Advisory |
Impacted products
{ "cisaActionDue": "2023-06-02", "cisaExploitAdd": "2023-05-12", "cisaRequiredAction": "Apply updates per vendor instructions or disconnect product if it is end-of-life.", "cisaVulnerabilityName": "Multiple Ruckus Wireless Products CSRF and RCE Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruckuswireless:ruckus_wireless_admin:*:*:*:*:*:*:*:*", "matchCriteriaId": "7580FF26-730D-4029-A33B-3A3105E5BC72", "versionEndIncluding": "10.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:smartzone_ap:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED4CD2B3-C3CE-437F-A01C-5A50B900FC4D", "versionEndExcluding": "6.1.0.0.9240", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h350:-:*:*:*:*:*:*:*", "matchCriteriaId": "D19E1647-DFDD-4AE9-8118-B6E27796F158", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h550:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AECE922-479C-4C3E-9905-1C742DCE9769", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r350:-:*:*:*:*:*:*:*", "matchCriteriaId": "728B95F9-BD5B-4C0B-ADBD-0B30AAC868EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r550:-:*:*:*:*:*:*:*", "matchCriteriaId": "215024F9-C68E-4919-9FD5-215CF900A830", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r650:-:*:*:*:*:*:*:*", "matchCriteriaId": "951BDA12-0294-472A-9292-F60AC6D4292B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r730:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB28A5E0-6F42-4133-B1D3-1D0116079094", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r760:-:*:*:*:*:*:*:*", "matchCriteriaId": "C50256D2-E89C-4992-B296-7F686C4A0E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r850:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A244DE5-A9B3-45BE-8AD1-154546F4F1F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:sz-144:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CA45AAC-D228-4F8B-AAD8-A41395C79DD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:sz100:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6E5537-CC32-46A3-BCA3-52B011E13564", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:sz300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A7CB834-555F-4259-AD12-DB56F42CA907", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t350c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E561E73-06B4-49E3-A24C-CCDFA0D278EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t350d:-:*:*:*:*:*:*:*", "matchCriteriaId": "271E8C2A-5AD8-47B7-B6C5-D996FD135412", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t350se:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1151656-21F9-442F-93AF-3E12B497CEF1", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t750:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C15AA25-82B2-4C02-8361-E8F6179B525A", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t750se:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E1DE3AD-CA13-44CE-ACF1-3DE2D6C691BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t811-cm:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0680FEA-592F-4610-85D3-D52335906B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruckuswireless:ruckus_wireless_admin:*:*:*:*:*:*:*:*", "matchCriteriaId": "7580FF26-730D-4029-A33B-3A3105E5BC72", "versionEndIncluding": "10.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:smartzone_ap:*:*:*:*:*:*:*:*", "matchCriteriaId": "E19ED3EC-4946-4CB1-9227-FC0B500488B9", "versionEndExcluding": "5.2.2.0.2064", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r550:-:*:*:*:*:*:*:*", "matchCriteriaId": "215024F9-C68E-4919-9FD5-215CF900A830", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r650:-:*:*:*:*:*:*:*", "matchCriteriaId": "951BDA12-0294-472A-9292-F60AC6D4292B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r730:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB28A5E0-6F42-4133-B1D3-1D0116079094", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r850:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A244DE5-A9B3-45BE-8AD1-154546F4F1F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t504:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EB7F76C-637E-4194-B7CD-36C0EB5C84D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t750:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C15AA25-82B2-4C02-8361-E8F6179B525A", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t750se:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E1DE3AD-CA13-44CE-ACF1-3DE2D6C691BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t811-cm:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0680FEA-592F-4610-85D3-D52335906B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruckuswireless:ruckus_wireless_admin:*:*:*:*:*:*:*:*", "matchCriteriaId": "7580FF26-730D-4029-A33B-3A3105E5BC72", "versionEndIncluding": "10.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:smartzone_ap:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8EFC8C1-5D6B-44AB-919A-FD7365E666EA", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h500:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBE5491D-89A5-4690-8374-0CD27852CCB2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7FDEC42-0D72-4841-B0FE-B0B0B00B6557", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7549541B-0F1A-45F8-8E5A-8034B00C2D2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruckuswireless:ruckus_wireless_admin:*:*:*:*:*:*:*:*", "matchCriteriaId": "7580FF26-730D-4029-A33B-3A3105E5BC72", "versionEndIncluding": "10.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:smartzone_ap:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3679017-4730-49AF-8CE7-35B82F504EA5", "versionEndExcluding": "6.1.1.0.1274", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r560:-:*:*:*:*:*:*:*", "matchCriteriaId": "AADED848-CAF5-4EF6-BAC6-6BE35CCE7815", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruckuswireless:ruckus_wireless_admin:*:*:*:*:*:*:*:*", "matchCriteriaId": "7580FF26-730D-4029-A33B-3A3105E5BC72", "versionEndIncluding": "10.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:commscope:ruckus_smartzone_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC1AFF4-766D-4DFF-B7A0-39EFE686F33B", "versionEndExcluding": "5.2.1.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-144:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CA45AAC-D228-4F8B-AAD8-A41395C79DD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:sz300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A7CB834-555F-4259-AD12-DB56F42CA907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruckuswireless:ruckus_wireless_admin:*:*:*:*:*:*:*:*", "matchCriteriaId": "7580FF26-730D-4029-A33B-3A3105E5BC72", "versionEndIncluding": "10.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.0.0.935:*:*:*:*:*:*:*", "matchCriteriaId": "98787AFD-705A-4ECA-A735-1412ED55B71C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-144:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CA45AAC-D228-4F8B-AAD8-A41395C79DD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:sz100:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6E5537-CC32-46A3-BCA3-52B011E13564", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:sz300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A7CB834-555F-4259-AD12-DB56F42CA907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruckuswireless:ruckus_wireless_admin:*:*:*:*:*:*:*:*", "matchCriteriaId": "7580FF26-730D-4029-A33B-3A3105E5BC72", "versionEndIncluding": "10.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:m510-jp:-:*:*:*:*:*:*:*", "matchCriteriaId": "007DE148-E501-4A35-8F10-ACD28FF2819B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:p300:-:*:*:*:*:*:*:*", "matchCriteriaId": "12E3F2DA-3A4B-421A-ACE0-A764B9B57FF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:q410:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB66E1A9-D6B5-455F-B6C0-FD2EF45CF509", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:q710:-:*:*:*:*:*:*:*", "matchCriteriaId": "54D44A0E-66C0-4522-90AC-16F7D5738D8F", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:q910:-:*:*:*:*:*:*:*", "matchCriteriaId": "80C949D8-D53C-4B5B-A851-51FAFAB0011D", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t811-cm\\(non-spf\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE9892F-8F72-4D92-B7A2-4B4B41AB8729", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:zd1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "86341154-62AA-43A3-9B65-3B95873317C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:zd1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE17AF8-0965-4D9D-A1A3-40976BDF10C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:zd1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "763E2D39-085A-4E8B-BBC1-B0567666FF5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:zd3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "E149CEA6-5EF5-4CD6-969F-D5DD33D04744", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:zd5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "640C64BD-EBD1-43D7-AEB9-A51E2069BC4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruckuswireless:ruckus_wireless_admin:*:*:*:*:*:*:*:*", "matchCriteriaId": "7580FF26-730D-4029-A33B-3A3105E5BC72", "versionEndIncluding": "10.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:commscope:ruckus_smartzone_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2D11729-5815-46AC-A2B6-E1570FDBED8E", "versionEndExcluding": "5.2.1.3.1695", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-144-federal:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C68AA80-C987-4B00-AB39-4D14910EB961", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:sz300-federal:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DEAC3DF-557E-4070-A23E-524A4A3B9226", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin\u0026password=password$(curl substring." }, { "lang": "es", "value": "Ruckus Wireless Admin hasta la versi\u00f3n 10.4 permite la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de una solicitud HTTP GET no autenticada, como lo demuestra /forms/doLogin?login_username=admin\u0026amp;password=password$(curl substring." } ], "id": "CVE-2023-25717", "lastModified": "2025-08-22T21:09:15.577", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-02-13T20:15:10.973", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Product", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Product", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/315" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-07 07:15
Modified
2025-08-22 21:09
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN45891816/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://support.ruckuswireless.com/security_bulletins/323 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN45891816/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.ruckuswireless.com/security_bulletins/323 | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r750_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19637FB4-A1EC-4DDB-9FD2-B176427B9933", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r650_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F805AE7-830E-4D88-AA80-40FEC783AC84", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r650:-:*:*:*:*:*:*:*", "matchCriteriaId": "951BDA12-0294-472A-9292-F60AC6D4292B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r730_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F98CC2D-247B-493F-A1DD-8133622C2AE7", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r730:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB28A5E0-6F42-4133-B1D3-1D0116079094", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t750_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFCDC4FB-7448-4E19-AF4D-897180F3775B", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t750:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C15AA25-82B2-4C02-8361-E8F6179B525A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D6269F0-AFA6-48A9-92D2-3A3250B1E6C0", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:e510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D2FB77C-1E97-44C5-A961-7F91B1A8AB34", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:c110_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6531A85F-9AA8-4A26-9A81-09003B8AAF2E", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77671DB-6197-4C8D-B667-A0081350E5AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C00DA68-6EA2-4D88-B60C-6980D4953912", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "843E61F5-DE53-47B3-BF24-B817BE9F334E", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F625B309-F3BC-4899-B6B4-C460B7502730", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t305_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ED5CB06-9A07-4EF6-B730-7D24B8E131F7", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t305:-:*:*:*:*:*:*:*", "matchCriteriaId": "0500E6E8-D56C-41EC-B9C5-72C5DD955639", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:m510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EB3F18F-04F1-4D37-A74C-B12ED64ECDEE", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r720_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73590841-C0E4-423B-89F3-C5E3E5DC3A84", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r710_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD213C0E-8D62-43C1-AAAD-72AB2455F4C8", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t710_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AC75B29-992F-4917-B0A9-6B4C16905E3A", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t610_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0273FF13-6329-4A68-B2B1-674D0FDCEACC", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r610_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CA61CD3-AFD8-4C9B-B707-850A352EFF63", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t310d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D3D9629-CDD0-497E-A798-BD68696D7B0A", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t310s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47656F30-691A-4072-B5DF-0B4026133B24", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t310n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8508F154-5538-401A-8A1E-192C38A482B4", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t310c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D50969FD-837B-49B3-820E-E02CA9CD75E3", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t710s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11907B93-2CC9-43E7-98E9-B13370225009", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t610s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6B8C9F8-76A1-4B8C-8FB9-770CB0E7DC94", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t610s:-:*:*:*:*:*:*:*", "matchCriteriaId": "752CBB38-F5C6-4666-B062-B5E3B15CA1A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r550_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "260442D7-362E-4141-BE55-066154A5B587", "versionEndIncluding": "114.0.0.0.5585", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r550:-:*:*:*:*:*:*:*", "matchCriteriaId": "215024F9-C68E-4919-9FD5-215CF900A830", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r850_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "392561BB-1413-44A3-B4D1-CC4A57DC67F1", "versionEndIncluding": "114.0.0.0.5585", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r850:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A244DE5-A9B3-45BE-8AD1-154546F4F1F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t750se_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F079E97-F62E-4919-A21B-1443146FEB14", "versionEndIncluding": "114.0.0.0.5585", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t750se:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E1DE3AD-CA13-44CE-ACF1-3DE2D6C691BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F6AF187-4EC5-4F8A-9FB3-E1FD4F71FA4F", "versionEndIncluding": "110.0.0.0.2014", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:*:*:*:*:*:*:*:*", "matchCriteriaId": "93655935-481F-477B-A0C3-EFFFB822C9D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22D73A1E-302B-4494-B0CF-48D298A25916", "versionEndIncluding": "118.1.0.0.1274", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*", "matchCriteriaId": "700D0FAA-0964-486A-932B-08CF1A328468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22D73A1E-302B-4494-B0CF-48D298A25916", "versionEndIncluding": "118.1.0.0.1274", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*", "matchCriteriaId": "700D0FAA-0964-486A-932B-08CF1A328468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BEFF83F-4F8E-4BFE-B964-2F019A846EF0", "versionEndIncluding": "118.1.0.0.1908", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r560:*:*:*:*:*:*:*:*", "matchCriteriaId": "75E00EC7-030F-4E90-8747-4AA87C2DA73D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h550_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFDDACE4-B572-4E7F-8D7C-333B3108D0F8", "versionEndIncluding": "116.0.0.0.1506", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h550:*:*:*:*:*:*:*:*", "matchCriteriaId": "843E2FCE-C3EC-406A-8ECB-BA5F51C2DCFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1056C4F-1A29-474A-AD6F-6911F68ED36E", "versionEndIncluding": "116.0.0.0.3128", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h350:*:*:*:*:*:*:*:*", "matchCriteriaId": "389825B3-BD3F-48F9-A6EB-238D1485E24D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t350c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "561DDAE6-C5A0-4DA8-AC07-0EF7D06A8848", "versionEndIncluding": "116.0.0.0.1543", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t350c:*:*:*:*:*:*:*:*", "matchCriteriaId": "663BF055-A677-418A-8009-599D7BE04221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t350d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C77FF583-1BAF-4042-A5F0-07DF1FC4C5E4", "versionEndIncluding": "116.0.0.0.1543", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t350d:*:*:*:*:*:*:*:*", "matchCriteriaId": "4323CCB1-EE5E-498F-86F3-00CE6C75F10D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t350se_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCC95847-0984-466D-9227-5A44971260F2", "versionEndIncluding": "116.0.0.0.3136", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t350se:*:*:*:*:*:*:*:*", "matchCriteriaId": "60A48D4A-75D9-486B-896D-7BF11AD3ED6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "004DED59-2353-40D5-997A-E021728E4F23", "versionEndIncluding": "116.0.0.0.1655", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r350:*:*:*:*:*:*:*:*", "matchCriteriaId": "34B3B5B6-3365-47B2-847E-004489533CDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:smartzone_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E0D700D-F65B-49CC-BA09-41B22A6884C1", "versionEndIncluding": "6.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:commscope:ruckus_smartzone:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A4B5B7-E8A5-4FE1-8947-7BA90A37516A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DA133A-1251-4946-BC27-FECABFEA056A", "versionEndIncluding": "10.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC847897-E9C7-4247-BC22-E999847E1110", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section." }, { "lang": "es", "value": "Existe una vulnerabilidad de Cross-Site-Scripting en los productos Ruckus Access Point (ZoneDirector, SmartZone y AP Solo). Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que inicia sesi\u00f3n en el producto. En cuanto a los productos/modelos/versiones afectados, consulte la informaci\u00f3n proporcionada por el proveedor que figura en la secci\u00f3n [Referencias] o la lista en la secci\u00f3n [Estado del producto]." } ], "id": "CVE-2023-49225", "lastModified": "2025-08-22T21:09:15.577", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-12-07T07:15:12.880", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN45891816/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN45891816/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/323" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-28 15:15
Modified
2024-11-21 05:02
Severity ?
Summary
rkscli in Ruckus Wireless Unleashed through 200.7.10.92 allows a remote attacker to achieve command injection and jailbreak the CLI via a crafted CLI command. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | unleashed_firmware | * | |
ruckuswireless | c110 | - | |
ruckuswireless | e510 | - | |
ruckuswireless | h320 | - | |
ruckuswireless | h510 | - | |
ruckuswireless | m510 | - | |
ruckuswireless | r310 | - | |
ruckuswireless | r320 | - | |
ruckuswireless | r500 | - | |
ruckuswireless | r510 | - | |
ruckuswireless | r600 | - | |
ruckuswireless | r610 | - | |
ruckuswireless | r710 | - | |
ruckuswireless | r720 | - | |
ruckuswireless | r750 | - | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s | - | |
ruckuswireless | t310c | - | |
ruckuswireless | t310d | - | |
ruckuswireless | t310n | - | |
ruckuswireless | t310s | - | |
ruckuswireless | t610 | - | |
ruckuswireless | t710 | - | |
ruckuswireless | t710s | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:unleashed_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C6FE6A-B160-4C64-B900-9F5637EE2EF4", "versionEndIncluding": "200.7.10.102.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77671DB-6197-4C8D-B667-A0081350E5AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "rkscli in Ruckus Wireless Unleashed through 200.7.10.92 allows a remote attacker to achieve command injection and jailbreak the CLI via a crafted CLI command. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." }, { "lang": "es", "value": "rkscli en Ruckus Wireless Unleashed versiones hasta 200.7.10.92, permite a un atacante remoto lograr una inyecci\u00f3n de comandos y un jailbreak de la CLI por medio de un comando de la CLI dise\u00f1ado. Esto afecta a los dispositivos C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, y T710" } ], "id": "CVE-2020-13917", "lastModified": "2024-11-21T05:02:08.647", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-28T15:15:11.737", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-28 15:15
Modified
2024-11-21 05:02
Severity ?
Summary
An XSS issue in emfd in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute JavaScript code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | unleashed_firmware | * | |
ruckuswireless | c110 | - | |
ruckuswireless | e510 | - | |
ruckuswireless | h320 | - | |
ruckuswireless | h510 | - | |
ruckuswireless | m510 | - | |
ruckuswireless | r310 | - | |
ruckuswireless | r320 | - | |
ruckuswireless | r500 | - | |
ruckuswireless | r510 | - | |
ruckuswireless | r600 | - | |
ruckuswireless | r610 | - | |
ruckuswireless | r710 | - | |
ruckuswireless | r720 | - | |
ruckuswireless | r750 | - | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s | - | |
ruckuswireless | t310c | - | |
ruckuswireless | t310d | - | |
ruckuswireless | t310n | - | |
ruckuswireless | t310s | - | |
ruckuswireless | t610 | - | |
ruckuswireless | t710 | - | |
ruckuswireless | t710s | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:unleashed_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C6FE6A-B160-4C64-B900-9F5637EE2EF4", "versionEndIncluding": "200.7.10.102.92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77671DB-6197-4C8D-B667-A0081350E5AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299", "vulnerable": false }, { "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XSS issue in emfd in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute JavaScript code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." }, { "lang": "es", "value": "Un problema de tipo XSS en emfd en Ruckus Wireless Unleashed versiones hasta 200.7.10.102.92, permite a un atacante remoto ejecutar c\u00f3digo JavaScript por medio de una petici\u00f3n HTTP no autenticada. Esto afecta a los dispositivos C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, y T710" } ], "id": "CVE-2020-13913", "lastModified": "2024-11-21T05:02:08.097", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-28T15:15:11.517", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2020-13919 (GCVE-0-2020-13919)
Vulnerability from cvelistv5
Published
2020-07-28 14:46
Modified
2024-08-04 12:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to achieve command injection via a crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
▼ | URL | Tags |
---|---|---|
https://support.ruckuswireless.com/security_bulletins/304 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.438Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to achieve command injection via a crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-28T14:46:30", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-13919", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to achieve command injection via a crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.ruckuswireless.com/security_bulletins/304", "refsource": "CONFIRM", "url": "https://support.ruckuswireless.com/security_bulletins/304" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13919", "datePublished": "2020-07-28T14:46:30", "dateReserved": "2020-06-07T00:00:00", "dateUpdated": "2024-08-04T12:32:14.438Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-49225 (GCVE-0-2023-49225)
Vulnerability from cvelistv5
Published
2023-12-07 06:22
Modified
2025-05-28 13:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting (XSS)
Summary
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | CommScope, Inc. | ZoneDirector |
Version: 10.5.1 and earlier |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.350Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/323" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN45891816/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-49225", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-28T13:53:26.065683Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-28T13:58:41.326Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ZoneDirector", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "10.5.1 and earlier " } ] }, { "product": "SmartZone", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "6.1.1 and earlier " } ] }, { "product": "AP Solo R750", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R650", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R730", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T750", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R550", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.5585 and earlier " } ] }, { "product": "AP Solo R850", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.5585 and earlier " } ] }, { "product": "AP Solo T750SE", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.5585 and earlier " } ] }, { "product": "AP Solo R510", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T310D", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo E510", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo C110", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R320", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo H510", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo H320", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T310S", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T310N", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T310C", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T305", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo M510", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R720", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R710", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T710", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T710s", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T610", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T610s", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R610", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R310", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "110.0.0.0.2014 and earlier " } ] }, { "product": "AP Solo R760", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "118.1.0.0.1274 and earlier " } ] }, { "product": "AP Solo R560", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "118.1.0.0.1908 and earlier " } ] }, { "product": "AP Solo H550", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.1506 and earlier " } ] }, { "product": "AP Solo H350", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.3128 and earlier " } ] }, { "product": "AP Solo T350c", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.1543 and earlier " } ] }, { "product": "AP Solo T350d", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.1543 and earlier " } ] }, { "product": "AP Solo T350se", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.3136 and earlier " } ] }, { "product": "AP Solo R350", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.1655 and earlier " } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-07T06:22:32.328Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/323" }, { "url": "https://jvn.jp/en/jp/JVN45891816/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-49225", "datePublished": "2023-12-07T06:22:32.328Z", "dateReserved": "2023-11-24T00:19:52.591Z", "dateUpdated": "2025-05-28T13:58:41.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-13915 (GCVE-0-2020-13915)
Vulnerability from cvelistv5
Published
2020-07-28 14:46
Modified
2024-08-04 12:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Insecure permissions in emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allow a remote attacker to overwrite admin credentials via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
▼ | URL | Tags |
---|---|---|
https://support.ruckuswireless.com/security_bulletins/304 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.117Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Insecure permissions in emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allow a remote attacker to overwrite admin credentials via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-28T14:46:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-13915", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insecure permissions in emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allow a remote attacker to overwrite admin credentials via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.ruckuswireless.com/security_bulletins/304", "refsource": "CONFIRM", "url": "https://support.ruckuswireless.com/security_bulletins/304" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13915", "datePublished": "2020-07-28T14:46:12", "dateReserved": "2020-06-07T00:00:00", "dateUpdated": "2024-08-04T12:32:14.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-13913 (GCVE-0-2020-13913)
Vulnerability from cvelistv5
Published
2020-07-28 14:46
Modified
2024-08-04 12:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An XSS issue in emfd in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute JavaScript code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
▼ | URL | Tags |
---|---|---|
https://support.ruckuswireless.com/security_bulletins/304 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.243Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An XSS issue in emfd in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute JavaScript code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-28T14:46:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-13913", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An XSS issue in emfd in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute JavaScript code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.ruckuswireless.com/security_bulletins/304", "refsource": "CONFIRM", "url": "https://support.ruckuswireless.com/security_bulletins/304" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13913", "datePublished": "2020-07-28T14:46:02", "dateReserved": "2020-06-07T00:00:00", "dateUpdated": "2024-08-04T12:32:14.243Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-13916 (GCVE-0-2020-13916)
Vulnerability from cvelistv5
Published
2020-07-28 14:46
Modified
2024-08-04 12:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A stack buffer overflow in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
▼ | URL | Tags |
---|---|---|
https://support.ruckuswireless.com/security_bulletins/304 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.268Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A stack buffer overflow in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-28T14:46:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-13916", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A stack buffer overflow in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.ruckuswireless.com/security_bulletins/304", "refsource": "CONFIRM", "url": "https://support.ruckuswireless.com/security_bulletins/304" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13916", "datePublished": "2020-07-28T14:46:16", "dateReserved": "2020-06-07T00:00:00", "dateUpdated": "2024-08-04T12:32:14.268Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-25717 (GCVE-0-2023-25717)
Vulnerability from cvelistv5
Published
2023-02-13 00:00
Modified
2025-07-30 01:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:32:11.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/315" }, { "tags": [ "x_transferred" ], "url": "https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-25717", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-29T15:06:32.335785Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2023-05-12", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-25717" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:37:31.539Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2023-05-12T00:00:00+00:00", "value": "CVE-2023-25717 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin\u0026password=password$(curl substring." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-13T00:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/315" }, { "url": "https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-25717", "datePublished": "2023-02-13T00:00:00.000Z", "dateReserved": "2023-02-13T00:00:00.000Z", "dateUpdated": "2025-07-30T01:37:31.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-13917 (GCVE-0-2020-13917)
Vulnerability from cvelistv5
Published
2020-07-28 14:46
Modified
2024-08-04 12:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
rkscli in Ruckus Wireless Unleashed through 200.7.10.92 allows a remote attacker to achieve command injection and jailbreak the CLI via a crafted CLI command. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
▼ | URL | Tags |
---|---|---|
https://support.ruckuswireless.com/security_bulletins/304 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.179Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "rkscli in Ruckus Wireless Unleashed through 200.7.10.92 allows a remote attacker to achieve command injection and jailbreak the CLI via a crafted CLI command. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-28T14:46:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-13917", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "rkscli in Ruckus Wireless Unleashed through 200.7.10.92 allows a remote attacker to achieve command injection and jailbreak the CLI via a crafted CLI command. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.ruckuswireless.com/security_bulletins/304", "refsource": "CONFIRM", "url": "https://support.ruckuswireless.com/security_bulletins/304" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13917", "datePublished": "2020-07-28T14:46:21", "dateReserved": "2020-06-07T00:00:00", "dateUpdated": "2024-08-04T12:32:14.179Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-13914 (GCVE-0-2020-13914)
Vulnerability from cvelistv5
Published
2020-07-28 14:46
Modified
2024-08-04 12:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to cause a denial of service (Segmentation fault) to the webserver via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
▼ | URL | Tags |
---|---|---|
https://support.ruckuswireless.com/security_bulletins/304 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to cause a denial of service (Segmentation fault) to the webserver via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-28T14:46:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-13914", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to cause a denial of service (Segmentation fault) to the webserver via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.ruckuswireless.com/security_bulletins/304", "refsource": "CONFIRM", "url": "https://support.ruckuswireless.com/security_bulletins/304" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13914", "datePublished": "2020-07-28T14:46:06", "dateReserved": "2020-06-07T00:00:00", "dateUpdated": "2024-08-04T12:32:14.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-13918 (GCVE-0-2020-13918)
Vulnerability from cvelistv5
Published
2020-07-28 14:46
Modified
2024-08-04 12:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Incorrect access control in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to leak system information (that can be used for a jailbreak) via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References
▼ | URL | Tags |
---|---|---|
https://support.ruckuswireless.com/security_bulletins/304 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Incorrect access control in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to leak system information (that can be used for a jailbreak) via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-28T14:46:26", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.ruckuswireless.com/security_bulletins/304" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-13918", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect access control in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to leak system information (that can be used for a jailbreak) via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.ruckuswireless.com/security_bulletins/304", "refsource": "CONFIRM", "url": "https://support.ruckuswireless.com/security_bulletins/304" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13918", "datePublished": "2020-07-28T14:46:26", "dateReserved": "2020-06-07T00:00:00", "dateUpdated": "2024-08-04T12:32:14.180Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }