CVE-2016-1000216

Ruckus Wireless H500 web management interface authenticated command injection
Configurations

Configuration 1 (hide)

cpe:2.3:h:ruckus:wireless_h500:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:43

Type Values Removed Values Added
References () http://b910a83a1a1fa9c20d93-2435f2f08e773abe005b52170fce6d94.r84.cf2.rackcdn.com/security/faq-security-advisory-id-062117.txt - () http://b910a83a1a1fa9c20d93-2435f2f08e773abe005b52170fce6d94.r84.cf2.rackcdn.com/security/faq-security-advisory-id-062117.txt -
References () http://www.securityfocus.com/bid/93539 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/93539 - Third Party Advisory, VDB Entry
References () http://www.tripwire.com/state-of-security/vulnerability-management/ruckus-vulnerability/ - Technical Description, Third Party Advisory () http://www.tripwire.com/state-of-security/vulnerability-management/ruckus-vulnerability/ - Technical Description, Third Party Advisory
References () https://bitbucket.org/dudux/ruckus-rootshell - Exploit, Third Party Advisory () https://bitbucket.org/dudux/ruckus-rootshell - Exploit, Third Party Advisory

Information

Published : 2016-10-10 20:59

Updated : 2024-11-21 02:43


NVD link : CVE-2016-1000216

Mitre link : CVE-2016-1000216

CVE.ORG link : CVE-2016-1000216


JSON object : View

Products Affected

ruckus

  • wireless_h500
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')