Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
References
Link | Resource |
---|---|
https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/ | Exploit Third Party Advisory |
https://support.ruckuswireless.com/security_bulletins/315 | Patch Product Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
No history.
Information
Published : 2023-02-13 20:15
Updated : 2023-02-23 16:26
NVD link : CVE-2023-25717
Mitre link : CVE-2023-25717
CVE.ORG link : CVE-2023-25717
JSON object : View
Products Affected
ruckuswireless
- r720
- r700
- t710s
- r850
- r750
- r600
- h350
- r550
- e510
- r510
- r710
- sz100
- r300
- p300
- t350se
- zd1100
- r730
- t310n
- q910
- r610
- t310s
- r320
- t811-cm
- t310c
- t350d
- q410
- t811-cm\(non-spf\)
- h320
- r350
- zd1200
- sz-144
- m510
- ruckus_wireless_admin
- h550
- r560
- h510
- zd5000
- h500
- t504
- t301s
- r760
- r310
- zd1000
- t301n
- t310d
- smartzone
- sz-144-federal
- r650
- t350c
- zd3000
- sz300-federal
- r500
- t610
- t710
- t300
- smartzone_ap
- t750
- q710
- sz300
- m510-jp
- t750se
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')