First published: Wed Feb 14 2018(Updated: )
Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ruckuswireless Solo Access Point Firmware | <=r110.0 | |
Ruckuswireless Smartzone Managed Access Point Firmware | <=r5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.