CVE-2023-25717
13.02.2023, 20:15
Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
Vendor | Product | Version |
---|---|---|
ruckuswireless | ruckus_wireless_admin | 𝑥 ≤ 10.4 |
ruckuswireless | smartzone_ap | 𝑥 < 6.1.0.0.9240 |
ruckuswireless | ruckus_wireless_admin | 𝑥 ≤ 10.4 |
ruckuswireless | smartzone_ap | 𝑥 < 5.2.2.0.2064 |
ruckuswireless | ruckus_wireless_admin | 𝑥 ≤ 10.4 |
ruckuswireless | smartzone_ap | 𝑥 < 3.6.2.0.795 |
ruckuswireless | ruckus_wireless_admin | 𝑥 ≤ 10.4 |
ruckuswireless | smartzone_ap | 𝑥 < 6.1.1.0.1274 |
ruckuswireless | ruckus_wireless_admin | 𝑥 ≤ 10.4 |
ruckuswireless | smartzone | 𝑥 < 5.2.1.3 |
ruckuswireless | ruckus_wireless_admin | 𝑥 ≤ 10.4 |
ruckuswireless | smartzone | 6.1.0.0.935 |
ruckuswireless | ruckus_wireless_admin | 𝑥 ≤ 10.4 |
ruckuswireless | ruckus_wireless_admin | 𝑥 ≤ 10.4 |
ruckuswireless | smartzone | 𝑥 < 5.2.1.3.1695 |
𝑥
= Vulnerable software versions
References