Описание
Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems.
Ссылки
- MitigationVendor Advisory
- MitigationVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до r110.0 (включая)
cpe:2.3:o:ruckuswireless:solo_access_point_firmware:*:*:*:*:*:*:*:*
Конфигурация 2Версия до r5.0 (включая)
cpe:2.3:o:ruckuswireless:smartzone_managed_access_point_firmware:*:*:*:*:*:*:*:*
EPSS
Процентиль: 90%
0.05561
Низкий
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-78
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems.
EPSS
Процентиль: 90%
0.05561
Низкий
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-78