Описание
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
Ссылки
- Third Party Advisory
- ExploitThird Party Advisory
- Vendor Advisory
- ProductVendor Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- Vendor Advisory
- ProductVendor Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.5.1.0.21 (включая)
Одновременно
cpe:2.3:a:commscope:ruckus_vriot:*:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_iot_module:-:*:*:*:*:*:*:*
EPSS
Процентиль: 97%
0.41549
Средний
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-78
Связанные уязвимости
github
больше 3 лет назад
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
EPSS
Процентиль: 97%
0.41549
Средний
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-78