Description
Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway mode is enabled. Attackers can exploit this vulnerability by sending specially crafted requests through the management interface to achieve arbitrary code execution on affected systems.
Published: 2026-03-26
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows authenticated users to send specially crafted requests via the web‑based management interface of Ruckus Unleashed systems when gateway mode is enabled, leading to arbitrary code execution on the device. This represents a classic operating system command injection weakness (CWE‑78). Successful exploitation would grant the attacker full control over the affected device, enabling them to alter configurations, install additional malware, or pivot to other network assets.

Affected Systems

Affected products include a broad range of Ruckus routers and gateways such as the H350, H550, R350, R550, R650, R750, R850, T350c, T350d, T350se, T750, T750SE, Unleashed, C110, E510, H320, H510, M510‑JP, R320, R510, R610, R710, R720, T310c, T310d, T310n, T310s, T610, T710, and T710s. Version information is not specified in the advisory, so all firmware revisions of these models that support gateway mode remain potentially vulnerable.

Risk and Exploitability

According to the CVSS score, the vulnerability has a severity of 7.7, indicating significant risk. The exploit score (EPSS) is not released, and the vulnerability is not catalogued in CISA’s KEV list, suggesting a lower public exploitation rate so far. The attack requires authenticated access to the device’s management interface, so attackers must first gain legitimate credentials or otherwise bypass authentication. Once authenticated, they can send crafted HTTP requests to trigger the command injection and execute arbitrary code. The risk is amplified on networks where the management interface is exposed to untrusted networks or the internet.

Generated by OpenCVE AI on March 26, 2026 at 20:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update released by Ruckus for the affected devices.
  • If gateway mode is not required for your deployment, disable it to eliminate the attack surface.
  • Limit management interface access to trusted networks or use VPN tunnels and restrict inbound ports to known administrators.
  • Verify that the firmware update removes the command injection bug by testing in a lab or applying the vendor's validation checklist.
  • If immediate patching is not feasible, isolate vulnerable devices from critical network segments until a fix is applied.

Generated by OpenCVE AI on March 26, 2026 at 20:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Ruckusnetworks
Ruckusnetworks ruckus C110
Ruckusnetworks ruckus E510
Ruckusnetworks ruckus H320
Ruckusnetworks ruckus H350
Ruckusnetworks ruckus H510
Ruckusnetworks ruckus H550
Ruckusnetworks ruckus M510-jp
Ruckusnetworks ruckus R320
Ruckusnetworks ruckus R350
Ruckusnetworks ruckus R510
Ruckusnetworks ruckus R550
Ruckusnetworks ruckus R610
Ruckusnetworks ruckus R650
Ruckusnetworks ruckus R710
Ruckusnetworks ruckus R720
Ruckusnetworks ruckus R750
Ruckusnetworks ruckus R850
Ruckusnetworks ruckus T310c
Ruckusnetworks ruckus T310d
Ruckusnetworks ruckus T310n
Ruckusnetworks ruckus T310s
Ruckusnetworks ruckus T350c
Ruckusnetworks ruckus T350d
Ruckusnetworks ruckus T350se
Ruckusnetworks ruckus T610
Ruckusnetworks ruckus T710
Ruckusnetworks ruckus T710s
Ruckusnetworks ruckus T750
Ruckusnetworks ruckus T750se
Ruckusnetworks ruckus Unleashed
Vendors & Products Ruckusnetworks
Ruckusnetworks ruckus C110
Ruckusnetworks ruckus E510
Ruckusnetworks ruckus H320
Ruckusnetworks ruckus H350
Ruckusnetworks ruckus H510
Ruckusnetworks ruckus H550
Ruckusnetworks ruckus M510-jp
Ruckusnetworks ruckus R320
Ruckusnetworks ruckus R350
Ruckusnetworks ruckus R510
Ruckusnetworks ruckus R550
Ruckusnetworks ruckus R610
Ruckusnetworks ruckus R650
Ruckusnetworks ruckus R710
Ruckusnetworks ruckus R720
Ruckusnetworks ruckus R750
Ruckusnetworks ruckus R850
Ruckusnetworks ruckus T310c
Ruckusnetworks ruckus T310d
Ruckusnetworks ruckus T310n
Ruckusnetworks ruckus T310s
Ruckusnetworks ruckus T350c
Ruckusnetworks ruckus T350d
Ruckusnetworks ruckus T350se
Ruckusnetworks ruckus T610
Ruckusnetworks ruckus T710
Ruckusnetworks ruckus T710s
Ruckusnetworks ruckus T750
Ruckusnetworks ruckus T750se
Ruckusnetworks ruckus Unleashed

Thu, 26 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway mode is enabled. Attackers can exploit this vulnerability by sending specially crafted requests through the management interface to achieve arbitrary code execution on affected systems.
Title Ruckus Unleashed Authenticated RCE in Gateway Mode
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Ruckusnetworks Ruckus C110 Ruckus E510 Ruckus H320 Ruckus H350 Ruckus H510 Ruckus H550 Ruckus M510-jp Ruckus R320 Ruckus R350 Ruckus R510 Ruckus R550 Ruckus R610 Ruckus R650 Ruckus R710 Ruckus R720 Ruckus R750 Ruckus R850 Ruckus T310c Ruckus T310d Ruckus T310n Ruckus T310s Ruckus T350c Ruckus T350d Ruckus T350se Ruckus T610 Ruckus T710 Ruckus T710s Ruckus T750 Ruckus T750se Ruckus Unleashed
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-27T21:55:37.051Z

Reserved: 2026-03-23T16:18:41.704Z

Link: CVE-2023-7338

cve-icon Vulnrichment

Updated: 2026-03-27T21:55:32.806Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T20:16:08.853

Modified: 2026-03-30T13:26:50.827

Link: CVE-2023-7338

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:25:32Z

Weaknesses