Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Changed
Confidentiality Impact Low
Integrity Impact Low
Availability Impact None
User Interaction Required
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.00322.
Exploitation none
Automatable no
Technical Impact partial
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Commscope
Subscribe
|
Ruckus Smartzone
Subscribe
|
|
Ruckuswireless
Subscribe
|
C110
Subscribe
C110 Firmware
Subscribe
E510
Subscribe
E510 Firmware
Subscribe
H320
Subscribe
H320 Firmware
Subscribe
H350
Subscribe
H350 Firmware
Subscribe
H510
Subscribe
H510 Firmware
Subscribe
H550
Subscribe
H550 Firmware
Subscribe
M510
Subscribe
M510 Firmware
Subscribe
R310
Subscribe
R310 Firmware
Subscribe
R320
Subscribe
R320 Firmware
Subscribe
R350
Subscribe
R350 Firmware
Subscribe
R510
Subscribe
R510 Firmware
Subscribe
R550
Subscribe
R550 Firmware
Subscribe
R560
Subscribe
R560 Firmware
Subscribe
R610
Subscribe
R610 Firmware
Subscribe
R650
Subscribe
R650 Firmware
Subscribe
R710
Subscribe
R710 Firmware
Subscribe
R720
Subscribe
R720 Firmware
Subscribe
R730
Subscribe
R730 Firmware
Subscribe
R750
Subscribe
R750 Firmware
Subscribe
R760
Subscribe
R760 Firmware
Subscribe
R850
Subscribe
R850 Firmware
Subscribe
Smartzone Firmware
Subscribe
T305
Subscribe
T305 Firmware
Subscribe
T310c
Subscribe
T310c Firmware
Subscribe
T310d
Subscribe
T310d Firmware
Subscribe
T310n
Subscribe
T310n Firmware
Subscribe
T310s
Subscribe
T310s Firmware
Subscribe
T350c
Subscribe
T350c Firmware
Subscribe
T350d
Subscribe
T350d Firmware
Subscribe
T350se
Subscribe
T350se Firmware
Subscribe
T610
Subscribe
T610 Firmware
Subscribe
T610s
Subscribe
T610s Firmware
Subscribe
T710
Subscribe
T710 Firmware
Subscribe
T710s
Subscribe
T710s Firmware
Subscribe
T750
Subscribe
T750 Firmware
Subscribe
T750se
Subscribe
T750se Firmware
Subscribe
Zonedirector
Subscribe
Zonedirector Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
Configuration 34 [-]
| AND |
|
Configuration 35 [-]
| AND |
|
Configuration 36 [-]
| AND |
|
Configuration 37 [-]
| AND |
|
Configuration 38 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-53228 | A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 22 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Commscope
Commscope ruckus Smartzone |
|
| CPEs | cpe:2.3:h:commscope:ruckus_smartzone:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Ruckuswireless smartzone
|
Commscope
Commscope ruckus Smartzone |
Wed, 28 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2025-05-28T13:58:41.326Z
Reserved: 2023-11-24T00:19:52.591Z
Link: CVE-2023-49225
Updated: 2024-08-02T21:53:45.350Z
Status : Modified
Published: 2023-12-07T07:15:12.880
Modified: 2025-08-22T21:09:15.577
Link: CVE-2023-49225
No data.
OpenCVE Enrichment
No data.
EUVD