CVE-2019-19836
22.01.2020, 19:15
AjaxRestrictedCmdStat in zap in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote code execution via a POST request that uses tools/_rcmdstat.jsp to write to a specified filename.Enginsight
Vendor | Product | Version |
---|---|---|
ruckuswireless | unleashed | 𝑥 < 200.7.10.202.94 |
ruckuswireless | zonedirector_1200_firmware | 𝑥 < 9.10.2.0.84 |
ruckuswireless | zonedirector_1200_firmware | 9.12.0 ≤ 𝑥 < 9.12.3.0.136 |
ruckuswireless | zonedirector_1200_firmware | 9.13.0 ≤ 𝑥 < 10.0.1.0.90 |
ruckuswireless | zonedirector_1200_firmware | 10.1.0 ≤ 𝑥 < 10.1.2.0.275 |
ruckuswireless | zonedirector_1200_firmware | 10.2.0 ≤ 𝑥 < 10.2.1.0.147 |
ruckuswireless | zonedirector_1200_firmware | 10.3.0 ≤ 𝑥 < 10.3.1.0.21 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References