Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5jcw-5gh7-q3j5

Опубликовано: 21 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where the authenticated configuration endpoint /admin/_conf.jsp writes the Wi-Fi guest password to memory with snprintf using the attacker-supplied value as the format string; a crafted password therefore triggers uncontrolled format-string processing and enables remote code execution on the controller.

An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where the authenticated configuration endpoint /admin/_conf.jsp writes the Wi-Fi guest password to memory with snprintf using the attacker-supplied value as the format string; a crafted password therefore triggers uncontrolled format-string processing and enables remote code execution on the controller.

EPSS

Процентиль: 69%
0.00598
Низкий

7.2 High

CVSS3

Дефекты

CWE-134

Связанные уязвимости

CVSS3: 7.2
nvd
7 месяцев назад

An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where the authenticated configuration endpoint `/admin/_conf.jsp` writes the Wi-Fi guest password to memory with snprintf using the attacker-supplied value as the format string; a crafted password therefore triggers uncontrolled format-string processing and enables remote code execution on the controller.

EPSS

Процентиль: 69%
0.00598
Низкий

7.2 High

CVSS3

Дефекты

CWE-134