Show filters
37 Total Results
Displaying 11-20 of 37
Sort by:
Attacker Value
Unknown
CVE-2020-13914
Disclosure Date: July 28, 2020 (last updated November 28, 2024)
webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to cause a denial of service (Segmentation fault) to the webserver via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
0
Attacker Value
Unknown
CVE-2020-13918
Disclosure Date: July 28, 2020 (last updated November 28, 2024)
Incorrect access control in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to leak system information (that can be used for a jailbreak) via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
0
Attacker Value
Unknown
CVE-2020-13913
Disclosure Date: July 28, 2020 (last updated February 21, 2025)
An XSS issue in emfd in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute JavaScript code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
0
Attacker Value
Unknown
CVE-2019-19838
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=get-platform-depends to admin/_cmdstat.jsp via the uploadFile attribute.
0
Attacker Value
Unknown
CVE-2019-19839
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=import-category to admin/_cmdstat.jsp via the uploadFile attribute.
0
Attacker Value
Unknown
CVE-2019-19837
Disclosure Date: January 23, 2020 (last updated November 27, 2024)
Incorrect access control in the web interface in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote information disclosure of bin/web.conf via HTTP requests.
0
Attacker Value
Unknown
CVE-2019-19835
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
SSRF in AjaxRestrictedCmdStat in zap in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote denial of service via the server attribute to the tools/_rcmdstat.jsp URI.
0
Attacker Value
Unknown
CVE-2019-19841
Disclosure Date: January 22, 2020 (last updated February 21, 2025)
emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=packet-capture to admin/_cmdstat.jsp via the mac attribute.
0
Attacker Value
Unknown
CVE-2019-19840
Disclosure Date: January 22, 2020 (last updated February 21, 2025)
A stack-based buffer overflow in zap_parse_args in zap.c in zap in Ruckus Unleashed through 200.7.10.102.64 allows remote code execution via an unauthenticated HTTP request.
0
Attacker Value
Unknown
CVE-2019-19834
Disclosure Date: January 22, 2020 (last updated February 21, 2025)
Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.
0