Advisories

Ruckus Unleashed Authenticated RCE in Gateway Mode

Go Back
severity
high
date
Affecting
  • RUCKUS H350

  • RUCKUS H550

  • RUCKUS R350

  • RUCKUS R550

  • RUCKUS R650

  • RUCKUS R750

  • RUCKUS R850

  • RUCKUS T350c

  • RUCKUS T350d

  • RUCKUS T350se

  • RUCKUS T750

  • RUCKUS T750SE

  • RUCKUS Unleashed

  • Ruckus C110

  • Ruckus E510

  • Ruckus H320

  • Ruckus H510

  • Ruckus M510-JP

  • Ruckus R320

  • Ruckus R510

  • Ruckus R610

  • Ruckus R710

  • Ruckus R720

  • Ruckus T310c

  • Ruckus T310d

  • Ruckus T310n

  • Ruckus T310s

  • Ruckus T610

  • Ruckus T710

  • Ruckus T710s

CWE
  • CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
CVSS
7.7
CVSS V4 Vector
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Description
Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway mode is enabled. Attackers can exploit this vulnerability by sending specially crafted requests through the management interface to achieve arbitrary code execution on affected systems.

Ready to get Started?

Explore VulnCheck, a next-generation Cyber Threat Intelligence platform, which provides exploit and vulnerability intelligence to help you prioritize and remediate vulnerabilities that matter.
  • Vulnerability Prioritization
    Prioritize vulnerabilities that matter based on the threat landscape and defer vulnerabilities that don't.
  • Early Warning System
    Real-time alerting of changes in the vulnerability landscape so that you can take action before the attacks start.