Unknown
CVE-2023-49225
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-49225
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- c110 firmware,
- e510 firmware,
- h320 firmware,
- h350 firmware,
- h510 firmware,
- h550 firmware,
- m510 firmware,
- r310 firmware,
- r320 firmware,
- r350 firmware,
- r510 firmware,
- r550 firmware,
- r560 firmware,
- r610 firmware,
- r650 firmware,
- r710 firmware,
- r720 firmware,
- r730 firmware,
- r750 firmware,
- r760 firmware,
- r850 firmware,
- smartzone firmware,
- t305 firmware,
- t310c firmware,
- t310d firmware,
- t310n firmware,
- t310s firmware,
- t350c firmware,
- t350d firmware,
- t350se firmware,
- t610 firmware,
- t610s firmware,
- t710 firmware,
- t710s firmware,
- t750 firmware,
- t750se firmware,
- zonedirector firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: