In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) prior to 3.6.2.0.795, SmartZone 100 (SZ-100) prior to 3.6.2.0.795, SmartZone 300 (SZ300) prior to 3.6.2.0.795, Virtual SmartZone (vSZ) prior to 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows malicious users to change and set unauthorized "illegal region code" by remote code Execution command injection which leads to run illegal frequency with maxi output power. Vulnerability allows malicious user to create an arbitrary amount of ssid wlans interface per radio which creates overhead over noise (the default max limit is 8 ssid only per radio in solo AP). Vulnerability allows malicious user to unlock hidden regions by privilege command injection in WEB GUI.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ruckuswireless r310_firmware 10.5.1.0.199 |
||
ruckuswireless r500_firmware 10.5.1.0.199 |
||
ruckuswireless r600_firmware 10.5.1.0.199 |
||
ruckuswireless t300_firmware 10.5.1.0.199 |
||
ruckuswireless t301n_firmware 10.5.1.0.199 |
||
ruckuswireless t301s_firmware 10.5.1.0.199 |
||
ruckuswireless scg200_firmware |
||
ruckuswireless sz-100_firmware |
||
ruckuswireless sz-300_firmware |
||
ruckuswireless vsz_firmware |
||
ruckuswireless zonedirector_1100_firmware 9.10.2.0.130 |
||
ruckuswireless zonedirector_1200_firmware 10.2.1.0.218 |
||
ruckuswireless zonedirector_3000_firmware 10.2.1.0.218 |
||
ruckuswireless zonedirector_5000_firmware 10.0.1.0.151 |