Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ruckuswireless vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv3
CVE-2019-19834
Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed up to and including 200.7.10.102.64 allows a remote malicious user to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.
Ruckuswireless Unleashed
Ruckuswireless Zonedirector 1200 Firmware
7.5
CVSSv3
CVE-2019-19835
SSRF in AjaxRestrictedCmdStat in zap in Ruckus Wireless Unleashed up to and including 200.7.10.102.64 allows a remote denial of service via the server attribute to the tools/_rcmdstat.jsp URI.
Ruckuswireless Unleashed
Ruckuswireless Zonedirector 1200 Firmware
5.3
CVSSv3
CVE-2019-19837
Incorrect access control in the web interface in Ruckus Wireless Unleashed up to and including 200.7.10.102.64 allows remote information disclosure of bin/web.conf via HTTP requests.
Ruckuswireless Unleashed
Ruckuswireless Zonedirector 1200 Firmware
9.8
CVSSv3
CVE-2019-19839
emfd in Ruckus Wireless Unleashed up to and including 200.7.10.102.64 allows remote malicious users to execute OS commands via a POST request with the attribute xcmd=import-category to admin/_cmdstat.jsp via the uploadFile attribute.
Ruckuswireless Unleashed
Ruckuswireless Zonedirector 1200 Firmware
9.8
CVSSv3
CVE-2019-19840
A stack-based buffer overflow in zap_parse_args in zap.c in zap in Ruckus Unleashed up to and including 200.7.10.102.64 allows remote code execution via an unauthenticated HTTP request.
Ruckuswireless Unleashed
Ruckuswireless Zonedirector 1200 Firmware
9.8
CVSSv3
CVE-2019-19842
emfd in Ruckus Wireless Unleashed up to and including 200.7.10.102.64 allows remote malicious users to execute OS commands via a POST request with the attribute xcmd=spectra-analysis to admin/_cmdstat.jsp via the mac attribute.
Ruckuswireless Unleashed
Ruckuswireless Zonedirector 1200 Firmware
NA
CVE-2013-5030
Ruckus Wireless Zoneflex 2942 devices with firmware 9.6.0.0.267 allow remote malicious users to bypass authentication, and subsequently access certain configuration/ and maintenance/ scripts, by constructing a crafted URI after receiving an authentication error for an arbitrary l...
Ruckuswireless Zoneflex 2942 Firmware 9.6.0.0.267
Ruckuswireless Zoneflex 2942 -
1 EDB exploit
8.8
CVSSv3
CVE-2017-6230
Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective ...
Ruckuswireless Solo Access Point Firmware
Ruckuswireless Smartzone Managed Access Point Firmware
7.5
CVSSv3
CVE-2020-13914
webs in Ruckus Wireless Unleashed up to and including 200.7.10.102.92 allows a remote malicious user to cause a denial of service (Segmentation fault) to the webserver via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R...
Ruckuswireless Unleashed Firmware
7.5
CVSSv3
CVE-2020-13918
Incorrect access control in webs in Ruckus Wireless Unleashed up to and including 200.7.10.102.92 allows a remote malicious user to leak system information (that can be used for a jailbreak) via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R...
Ruckuswireless Unleashed Firmware
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
client side
CVE-2023-31889
template injection
CVE-2024-4304
CVE-2006-4304
CVE-2024-33272
type confusion
CVE-2024-21345
CVE-2024-33271
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »