A reflected Cross site scripting (XSS) vulnerability in Ruckus Unleashed 200.13.6.1.319 via the name parameter to the the captive-portal endpoint selfguestpass/guestAccessSubmit.jsp.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 30 Dec 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Ruckusnetworks
Ruckusnetworks unleashed H350
Ruckusnetworks unleashed H350 Firmware
Ruckusnetworks unleashed H550
Ruckusnetworks unleashed H550 Firmware
Ruckusnetworks unleashed R350
Ruckusnetworks unleashed R350 Firmware
Ruckusnetworks unleashed R350e
Ruckusnetworks unleashed R350e Firmware
Ruckusnetworks unleashed R370
Ruckusnetworks unleashed R370 Firmware
Ruckusnetworks unleashed R550
Ruckusnetworks unleashed R550 Firmware
Ruckusnetworks unleashed R650
Ruckusnetworks unleashed R650 Firmware
Ruckusnetworks unleashed R670
Ruckusnetworks unleashed R670 Firmware
Ruckusnetworks unleashed R750
Ruckusnetworks unleashed R750 Firmware
Ruckusnetworks unleashed R770
Ruckusnetworks unleashed R770 Firmware
Ruckusnetworks unleashed R850
Ruckusnetworks unleashed R850 Firmware
Ruckusnetworks unleashed T350c
Ruckusnetworks unleashed T350c Firmware
Ruckusnetworks unleashed T350d
Ruckusnetworks unleashed T350d Firmware
Ruckusnetworks unleashed T350se
Ruckusnetworks unleashed T350se Firmware
Ruckusnetworks unleashed T670
Ruckusnetworks unleashed T670 Firmware
Ruckusnetworks unleashed T670sn
Ruckusnetworks unleashed T670sn Firmware
Ruckusnetworks unleashed T750
Ruckusnetworks unleashed T750 Firmware
Ruckusnetworks unleashed T750se
Ruckusnetworks unleashed T750se Firmware
CPEs cpe:2.3:h:ruckusnetworks:unleashed_h350:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_h550:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_r350:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_r350e:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_r370:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_r550:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_r650:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_r670:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_r750:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_r770:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_r850:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_t350c:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_t350d:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_t350se:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_t670:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_t670sn:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_t750:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckusnetworks:unleashed_t750se:-:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_h350_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_h550_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_r350_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_r350e_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_r370_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_r550_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_r650_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_r670_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_r750_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_r770_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_r850_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_t350c_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_t350d_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_t350se_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_t670_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_t670sn_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_t750_firmware:200.13.6.1.319:*:*:*:*:*:*:*
cpe:2.3:o:ruckusnetworks:unleashed_t750se_firmware:200.13.6.1.319:*:*:*:*:*:*:*
Vendors & Products Ruckusnetworks
Ruckusnetworks unleashed H350
Ruckusnetworks unleashed H350 Firmware
Ruckusnetworks unleashed H550
Ruckusnetworks unleashed H550 Firmware
Ruckusnetworks unleashed R350
Ruckusnetworks unleashed R350 Firmware
Ruckusnetworks unleashed R350e
Ruckusnetworks unleashed R350e Firmware
Ruckusnetworks unleashed R370
Ruckusnetworks unleashed R370 Firmware
Ruckusnetworks unleashed R550
Ruckusnetworks unleashed R550 Firmware
Ruckusnetworks unleashed R650
Ruckusnetworks unleashed R650 Firmware
Ruckusnetworks unleashed R670
Ruckusnetworks unleashed R670 Firmware
Ruckusnetworks unleashed R750
Ruckusnetworks unleashed R750 Firmware
Ruckusnetworks unleashed R770
Ruckusnetworks unleashed R770 Firmware
Ruckusnetworks unleashed R850
Ruckusnetworks unleashed R850 Firmware
Ruckusnetworks unleashed T350c
Ruckusnetworks unleashed T350c Firmware
Ruckusnetworks unleashed T350d
Ruckusnetworks unleashed T350d Firmware
Ruckusnetworks unleashed T350se
Ruckusnetworks unleashed T350se Firmware
Ruckusnetworks unleashed T670
Ruckusnetworks unleashed T670 Firmware
Ruckusnetworks unleashed T670sn
Ruckusnetworks unleashed T670sn Firmware
Ruckusnetworks unleashed T750
Ruckusnetworks unleashed T750 Firmware
Ruckusnetworks unleashed T750se
Ruckusnetworks unleashed T750se Firmware

Thu, 27 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Ruckus
Ruckus unleashed
Vendors & Products Ruckus
Ruckus unleashed

Wed, 26 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 25 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
Description A reflected Cross site scripting (XSS) vulnerability in Ruckus Unleashed 200.13.6.1.319 via the name parameter to the the captive-portal endpoint selfguestpass/guestAccessSubmit.jsp.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-26T14:49:35.101Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-63735

cve-icon Vulnrichment

Updated: 2025-11-26T14:49:30.415Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-25T22:15:47.860

Modified: 2025-12-30T16:35:33.290

Link: CVE-2025-63735

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-27T16:28:01Z

Weaknesses