CVE-2017-6230
14.02.2018, 19:29
Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems.
Vendor | Product | Version |
---|---|---|
ruckuswireless | solo_access_point_firmware | 𝑥 ≤ r110.0 |
ruckuswireless | smartzone_managed_access_point_firmware | 𝑥 ≤ r5.0 |
𝑥
= Vulnerable software versions