AjaxRestrictedCmdStat in zap in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote code execution via a POST request that uses tools/_rcmdstat.jsp to write to a specified filename.
References
Link | Resource |
---|---|
https://alephsecurity.com/2020/01/14/ruckus-wireless | Exploit Technical Description Third Party Advisory |
https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10816.html | Third Party Advisory |
https://www.ruckuswireless.com/security/299/view/txt | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
No history.
Information
Published : 2020-01-22 19:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-19836
Mitre link : CVE-2019-19836
CVE.ORG link : CVE-2019-19836
JSON object : View
Products Affected
ruckuswireless
- r310
- t710
- e510
- unleashed
- t310
- h320
- zonedirector_1200
- r320
- t610
- c110
- m510
- h510
- r510
- r610
- r720
- zonedirector_1200_firmware
- r710
CWE
CWE-20
Improper Input Validation