Description
Incorrect access control in the web interface in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote credential fetch via an unauthenticated HTTP request involving a symlink with /tmp and web/user/wps_tool_cache.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-9440 | Incorrect access control in the web interface in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote credential fetch via an unauthenticated HTTP request involving a symlink with /tmp and web/user/wps_tool_cache. |
References
History
No history.
Subscriptions
Ruckuswireless
Subscribe
C110
Subscribe
E510
Subscribe
H320
Subscribe
H510
Subscribe
M510
Subscribe
R310
Subscribe
R320
Subscribe
R510
Subscribe
R610
Subscribe
R710
Subscribe
R720
Subscribe
T310
Subscribe
T610
Subscribe
T710
Subscribe
Unleashed
Subscribe
Zonedirector 1200
Subscribe
Zonedirector 1200 Firmware
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:25:12.685Z
Reserved: 2019-12-17T00:00:00.000Z
Link: CVE-2019-19843
No data.
Status : Modified
Published: 2020-01-22T19:15:12.517
Modified: 2024-11-21T04:35:30.683
Link: CVE-2019-19843
No data.
OpenCVE Enrichment
No data.
EUVD