CVE-2019-19841
22.01.2020, 21:15
emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=packet-capture to admin/_cmdstat.jsp via the mac attribute.
Vendor | Product | Version |
---|---|---|
ruckuswireless | unleashed | 𝑥 < 200.7.10.202.94 |
ruckuswireless | zonedirector_1200_firmware | 𝑥 < 9.10.2.0.84 |
ruckuswireless | zonedirector_1200_firmware | 9.12.0 ≤ 𝑥 < 9.12.3.0.136 |
ruckuswireless | zonedirector_1200_firmware | 9.13.0 ≤ 𝑥 < 10.0.1.0.90 |
ruckuswireless | zonedirector_1200_firmware | 10.1.0 ≤ 𝑥 < 10.1.2.0.275 |
ruckuswireless | zonedirector_1200_firmware | 10.2.0 ≤ 𝑥 < 10.2.1.0.147 |
ruckuswireless | zonedirector_1200_firmware | 10.3.0 ≤ 𝑥 < 10.3.1.0.21 |
𝑥
= Vulnerable software versions
References