Ruckus Wireless H500 web management interface authenticated command injection
References
Link | Resource |
---|---|
https://bitbucket.org/dudux/ruckus-rootshell | Exploit Third Party Advisory |
http://www.tripwire.com/state-of-security/vulnerability-management/ruckus-vulnerability/ | Technical Description Third Party Advisory |
http://www.securityfocus.com/bid/93539 | Third Party Advisory VDB Entry |
http://b910a83a1a1fa9c20d93-2435f2f08e773abe005b52170fce6d94.r84.cf2.rackcdn.com/security/faq-security-advisory-id-062117.txt |
Configurations
Information
Published : 2016-10-10 13:59
Updated : 2017-07-06 18:29
NVD link : CVE-2016-1000216
Mitre link : CVE-2016-1000216
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
ruckus
- wireless_h500