Description
Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-15291 | Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems. |
References
History
No history.
Status: PUBLISHED
Assigner: brocade
Published:
Updated: 2024-09-16T19:04:44.170Z
Reserved: 2017-02-23T00:00:00.000Z
Link: CVE-2017-6230
No data.
Status : Modified
Published: 2018-02-14T19:29:00.260
Modified: 2024-11-21T03:29:18.643
Link: CVE-2017-6230
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD