CVE-2019-19841

emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=packet-capture to admin/_cmdstat.jsp via the mac attribute.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
VendorProductVersion
ruckuswirelessunleashed
𝑥
< 200.7.10.202.94
ruckuswirelesszonedirector_1200_firmware
𝑥
< 9.10.2.0.84
ruckuswirelesszonedirector_1200_firmware
9.12.0 ≤
𝑥
< 9.12.3.0.136
ruckuswirelesszonedirector_1200_firmware
9.13.0 ≤
𝑥
< 10.0.1.0.90
ruckuswirelesszonedirector_1200_firmware
10.1.0 ≤
𝑥
< 10.1.2.0.275
ruckuswirelesszonedirector_1200_firmware
10.2.0 ≤
𝑥
< 10.2.1.0.147
ruckuswirelesszonedirector_1200_firmware
10.3.0 ≤
𝑥
< 10.3.1.0.21
𝑥
= Vulnerable software versions