Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems.
References
Link | Resource |
---|---|
https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt | Mitigation Vendor Advisory |
https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt | Mitigation Vendor Advisory |
Configurations
History
21 Nov 2024, 03:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt - Mitigation, Vendor Advisory |
Information
Published : 2018-02-14 19:29
Updated : 2024-11-21 03:29
NVD link : CVE-2017-6230
Mitre link : CVE-2017-6230
CVE.ORG link : CVE-2017-6230
JSON object : View
Products Affected
ruckuswireless
- solo_access_point_firmware
- smartzone_managed_access_point_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')