Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.
2020-01-22T19:15:12.327
2024-11-21T04:35:29.280
Modified
CVSSv3.1: 7.2 (HIGH)
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | ruckuswireless | unleashed | < 200.7.10.202.94 | Yes |
Hardware | ruckuswireless | c110 | - | No |
Hardware | ruckuswireless | e510 | - | No |
Hardware | ruckuswireless | h320 | - | No |
Hardware | ruckuswireless | h510 | - | No |
Hardware | ruckuswireless | m510 | - | No |
Hardware | ruckuswireless | r310 | - | No |
Hardware | ruckuswireless | r320 | - | No |
Hardware | ruckuswireless | r510 | - | No |
Hardware | ruckuswireless | r610 | - | No |
Hardware | ruckuswireless | r710 | - | No |
Hardware | ruckuswireless | r720 | - | No |
Hardware | ruckuswireless | t310 | - | No |
Hardware | ruckuswireless | t610 | - | No |
Hardware | ruckuswireless | t710 | - | No |
Operating System | ruckuswireless | zonedirector_1200_firmware | < 9.10.2.0.84 | Yes |
Operating System | ruckuswireless | zonedirector_1200_firmware | < 9.12.3.0.136 | Yes |
Operating System | ruckuswireless | zonedirector_1200_firmware | < 10.0.1.0.90 | Yes |
Operating System | ruckuswireless | zonedirector_1200_firmware | < 10.1.2.0.275 | Yes |
Operating System | ruckuswireless | zonedirector_1200_firmware | < 10.2.1.0.147 | Yes |
Operating System | ruckuswireless | zonedirector_1200_firmware | < 10.3.1.0.21 | Yes |
Hardware | ruckuswireless | zonedirector_1200 | - | No |