A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.

Project Subscriptions

Vendors Products
Commscope Subscribe
Ruckus Smartzone Subscribe
Ruckuswireless Subscribe
C110 Firmware Subscribe
E510 Firmware Subscribe
H320 Firmware Subscribe
H350 Firmware Subscribe
H510 Firmware Subscribe
H550 Firmware Subscribe
M510 Firmware Subscribe
R310 Firmware Subscribe
R320 Firmware Subscribe
R350 Firmware Subscribe
R510 Firmware Subscribe
R550 Firmware Subscribe
R560 Firmware Subscribe
R610 Firmware Subscribe
R650 Firmware Subscribe
R710 Firmware Subscribe
R720 Firmware Subscribe
R730 Firmware Subscribe
R750 Firmware Subscribe
R760 Firmware Subscribe
R850 Firmware Subscribe
Smartzone Firmware Subscribe
T305 Firmware Subscribe
T310c Firmware Subscribe
T310d Firmware Subscribe
T310n Firmware Subscribe
T310s Firmware Subscribe
T350c Firmware Subscribe
T350d Firmware Subscribe
T350se Firmware Subscribe
T610 Firmware Subscribe
T610s Firmware Subscribe
T710 Firmware Subscribe
T710s Firmware Subscribe
T750 Firmware Subscribe
T750se Firmware Subscribe
Zonedirector Subscribe
Zonedirector Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-53228 A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 22 Aug 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Commscope
Commscope ruckus Smartzone
CPEs cpe:2.3:h:ruckuswireless:smartzone:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone:-:*:*:*:*:*:*:*
Vendors & Products Ruckuswireless smartzone
Commscope
Commscope ruckus Smartzone

Wed, 28 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2025-05-28T13:58:41.326Z

Reserved: 2023-11-24T00:19:52.591Z

Link: CVE-2023-49225

cve-icon Vulnrichment

Updated: 2024-08-02T21:53:45.350Z

cve-icon NVD

Status : Modified

Published: 2023-12-07T07:15:12.880

Modified: 2025-08-22T21:09:15.577

Link: CVE-2023-49225

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses