Description
Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-9431 | Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter. |
References
History
No history.
Subscriptions
Ruckuswireless
Subscribe
C110
Subscribe
E510
Subscribe
H320
Subscribe
H510
Subscribe
M510
Subscribe
R310
Subscribe
R320
Subscribe
R510
Subscribe
R610
Subscribe
R710
Subscribe
R720
Subscribe
T310
Subscribe
T610
Subscribe
T710
Subscribe
Unleashed
Subscribe
Zonedirector 1200
Subscribe
Zonedirector 1200 Firmware
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:25:12.676Z
Reserved: 2019-12-17T00:00:00.000Z
Link: CVE-2019-19834
No data.
Status : Modified
Published: 2020-01-22T19:15:12.327
Modified: 2024-11-21T04:35:29.280
Link: CVE-2019-19834
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD