Show filters
43 Total Results
Displaying 21-30 of 43
Sort by:
Attacker Value
Unknown
CVE-2021-33220
Disclosure Date: July 07, 2021 (last updated February 23, 2025)
An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. Hard-coded API Keys exist.
0
Attacker Value
Unknown
CVE-2021-33218
Disclosure Date: July 07, 2021 (last updated February 23, 2025)
An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Hard-coded System Passwords that provide shell access.
0
Attacker Value
Unknown
CVE-2021-33221
Disclosure Date: July 07, 2021 (last updated February 23, 2025)
An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Unauthenticated API Endpoints.
0
Attacker Value
Unknown
CVE-2020-26878
Disclosure Date: October 26, 2020 (last updated February 22, 2025)
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
0
Attacker Value
Unknown
CVE-2020-26879
Disclosure Date: October 26, 2020 (last updated February 22, 2025)
Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header.
0
Attacker Value
Unknown
CVE-2020-8830
Disclosure Date: May 05, 2020 (last updated February 21, 2025)
CSRF in login.asp on Ruckus devices allows an attacker to access the panel, and use SSRF to perform scraping or other analysis via the SUBCA-1 field on the Wireless Admin screen.
0
Attacker Value
Unknown
CVE-2020-8033
Disclosure Date: May 05, 2020 (last updated February 21, 2025)
Ruckus R500 3.4.2.0.384 devices allow XSS via the index.asp Device Name field.
0
Attacker Value
Unknown
CVE-2020-7983
Disclosure Date: May 05, 2020 (last updated February 21, 2025)
A CSRF issue in login.asp on Ruckus R500 3.4.2.0.384 devices allows remote attackers to access the panel or conduct SSRF attacks.
0
Attacker Value
Unknown
CVE-2020-9476
Disclosure Date: March 04, 2020 (last updated February 21, 2025)
ARRIS TG1692A devices allow remote attackers to discover the administrator login name and password by reading the /login page and performing base64 decoding.
0
Attacker Value
Unknown
CVE-2019-15806
Disclosure Date: August 29, 2019 (last updated November 08, 2023)
CommScope ARRIS TR4400 devices with firmware through A1.00.004-180301 are vulnerable to an authentication bypass to the administrative interface because they include the current base64 encoded password within http://192.168.1.1/basic_sett.html. Any user connected to the Wi-Fi can exploit this.
0