Impact
The vulnerability allows authenticated users to send specially crafted requests via the web‑based management interface of Ruckus Unleashed systems when gateway mode is enabled, leading to arbitrary code execution on the device. This represents a classic operating system command injection weakness (CWE‑78). Successful exploitation would grant the attacker full control over the affected device, enabling them to alter configurations, install additional malware, or pivot to other network assets.
Affected Systems
Affected products include a broad range of Ruckus routers and gateways such as the H350, H550, R350, R550, R650, R750, R850, T350c, T350d, T350se, T750, T750SE, Unleashed, C110, E510, H320, H510, M510‑JP, R320, R510, R610, R710, R720, T310c, T310d, T310n, T310s, T610, T710, and T710s. Version information is not specified in the advisory, so all firmware revisions of these models that support gateway mode remain potentially vulnerable.
Risk and Exploitability
According to the CVSS score, the vulnerability has a severity of 7.7, indicating significant risk. The exploit score (EPSS) is not released, and the vulnerability is not catalogued in CISA’s KEV list, suggesting a lower public exploitation rate so far. The attack requires authenticated access to the device’s management interface, so attackers must first gain legitimate credentials or otherwise bypass authentication. Once authenticated, they can send crafted HTTP requests to trigger the command injection and execute arbitrary code. The risk is amplified on networks where the management interface is exposed to untrusted networks or the internet.
OpenCVE Enrichment