CVE-2019-19834

EUVD-2019-9431
Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.2 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 79%
Affected Products (NVD)
VendorProductVersion
ruckuswirelessunleashed
𝑥
< 200.7.10.202.94
ruckuswirelesszonedirector_1200_firmware
𝑥
< 9.10.2.0.84
ruckuswirelesszonedirector_1200_firmware
9.12.0 ≤
𝑥
< 9.12.3.0.136
ruckuswirelesszonedirector_1200_firmware
9.13.0 ≤
𝑥
< 10.0.1.0.90
ruckuswirelesszonedirector_1200_firmware
10.1.0 ≤
𝑥
< 10.1.2.0.275
ruckuswirelesszonedirector_1200_firmware
10.2.0 ≤
𝑥
< 10.2.1.0.147
ruckuswirelesszonedirector_1200_firmware
10.3.0 ≤
𝑥
< 10.3.1.0.21
𝑥
= Vulnerable software versions