CVE-2019-19834
22.01.2020, 19:15
Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.
Vendor | Product | Version |
---|---|---|
ruckuswireless | unleashed | 𝑥 < 200.7.10.202.94 |
ruckuswireless | zonedirector_1200_firmware | 𝑥 < 9.10.2.0.84 |
ruckuswireless | zonedirector_1200_firmware | 9.12.0 ≤ 𝑥 < 9.12.3.0.136 |
ruckuswireless | zonedirector_1200_firmware | 9.13.0 ≤ 𝑥 < 10.0.1.0.90 |
ruckuswireless | zonedirector_1200_firmware | 10.1.0 ≤ 𝑥 < 10.1.2.0.275 |
ruckuswireless | zonedirector_1200_firmware | 10.2.0 ≤ 𝑥 < 10.2.1.0.147 |
ruckuswireless | zonedirector_1200_firmware | 10.3.0 ≤ 𝑥 < 10.3.1.0.21 |
𝑥
= Vulnerable software versions
References