Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems.
References
Link | Resource |
---|---|
https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt | Mitigation Vendor Advisory |
Information
Published : 2018-02-14 11:29
Updated : 2018-03-16 08:03
NVD link : CVE-2017-6230
Mitre link : CVE-2017-6230
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
ruckuswireless
- smartzone_managed_access_point_firmware
- solo_access_point_firmware