9
CVSSv2

CVE-2020-26878

Published: 26/10/2020 Updated: 21/07/2021
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Ruckus up to and including 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

commscope ruckus_vriot

Exploits

Ruckus IoT Controller (Ruckus vRIoT) versions 151021 and below suffer from a remote code execution vulnerability ...

Github Repositories

CVE-2020-26878 This is a modified version of the Ruckus exploit found at wwwexploit-dbcom/exploits/49110 Since the original exploit was written for Python 2, I tweaked it a little to make it work with Python 3 Note: I am not responsible for any illegal use of this exploit This is only for educational and testing purposes, with the goal of securing systems