Show filters
43 Total Results
Displaying 21-30 of 43
Sort by:
Attacker Value
Unknown

CVE-2021-33220

Disclosure Date: July 07, 2021 (last updated February 23, 2025)
An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. Hard-coded API Keys exist.
Attacker Value
Unknown

CVE-2021-33218

Disclosure Date: July 07, 2021 (last updated February 23, 2025)
An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Hard-coded System Passwords that provide shell access.
Attacker Value
Unknown

CVE-2021-33221

Disclosure Date: July 07, 2021 (last updated February 23, 2025)
An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Unauthenticated API Endpoints.
Attacker Value
Unknown

CVE-2020-26878

Disclosure Date: October 26, 2020 (last updated February 22, 2025)
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
Attacker Value
Unknown

CVE-2020-26879

Disclosure Date: October 26, 2020 (last updated February 22, 2025)
Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header.
Attacker Value
Unknown

CVE-2020-8830

Disclosure Date: May 05, 2020 (last updated February 21, 2025)
CSRF in login.asp on Ruckus devices allows an attacker to access the panel, and use SSRF to perform scraping or other analysis via the SUBCA-1 field on the Wireless Admin screen.
Attacker Value
Unknown

CVE-2020-8033

Disclosure Date: May 05, 2020 (last updated February 21, 2025)
Ruckus R500 3.4.2.0.384 devices allow XSS via the index.asp Device Name field.
Attacker Value
Unknown

CVE-2020-7983

Disclosure Date: May 05, 2020 (last updated February 21, 2025)
A CSRF issue in login.asp on Ruckus R500 3.4.2.0.384 devices allows remote attackers to access the panel or conduct SSRF attacks.
Attacker Value
Unknown

CVE-2020-9476

Disclosure Date: March 04, 2020 (last updated February 21, 2025)
ARRIS TG1692A devices allow remote attackers to discover the administrator login name and password by reading the /login page and performing base64 decoding.
Attacker Value
Unknown

CVE-2019-15806

Disclosure Date: August 29, 2019 (last updated November 08, 2023)
CommScope ARRIS TR4400 devices with firmware through A1.00.004-180301 are vulnerable to an authentication bypass to the administrative interface because they include the current base64 encoded password within http://192.168.1.1/basic_sett.html. Any user connected to the Wi-Fi can exploit this.
0