DDOS reflection amplification vulnerability in eAut module of Ruckus Wireless SmartZone controller that allows remote attackers to perform DOS attacks via crafted request.
References
Link | Resource |
---|---|
http://ruckus.com | Not Applicable |
http://smartzone-100.com | Broken Link |
https://anquan.baidu.com/article/1434 | Exploit Mitigation Technical Description Third Party Advisory |
https://github.com/lixiang957/CVE-2021-36630 | Exploit Third Party Advisory |
https://www.commscope.com/globalassets/digizuite/921070-faq-security-advisory-id-20210719-v1-0.pdf | Vendor Advisory |
https://www.freebuf.com/articles/web/260338.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2023-01-18 13:15
Updated : 2024-02-28 19:51
NVD link : CVE-2021-36630
Mitre link : CVE-2021-36630
CVE.ORG link : CVE-2021-36630
JSON object : View
Products Affected
ruckuswireless
- sz-100_firmware
- sz-100
- vsz
- sz-300_firmware
- sz-300
- vsz_firmware
- sz-144
- sz-144_firmware
CWE
CWE-770
Allocation of Resources Without Limits or Throttling