First published: Tue Jul 28 2020(Updated: )
A stack buffer overflow in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ruckuswireless Unleashed firmware | <=200.7.10.102.92 | |
Ruckus Wireless C110 | ||
Ruckus Wireless E510 | ||
Ruckus Wireless H320 | ||
Ruckus Wireless H510 | ||
Ruckus Wireless M510 | ||
Ruckus Wireless R310 | ||
Ruckus Wireless R320 | ||
Arris Ruckus Zoneflex R500 | ||
Ruckus Wireless R510 | ||
Ruckus Wireless R600 | ||
Ruckus Wireless R610 | ||
Ruckus Wireless R710 | ||
Ruckus Wireless R720 | ||
Ruckus Wireless R750 | ||
Ruckus Wireless T300 | ||
Ruckus Wireless T301n | ||
Ruckus Wireless T301s | ||
Ruckus Wireless T310c | ||
Ruckus Wireless T310d | ||
Ruckus Wireless T310n | ||
Ruckus Wireless T310s | ||
Ruckus Wireless T610 | ||
Ruckus Wireless T710 | ||
Ruckus Wireless T710S |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13916 is a critical severity vulnerability due to the potential for remote code execution.
To fix CVE-2020-13916, upgrade to Ruckus Wireless Unleashed firmware version greater than 200.7.10.102.92.
The vulnerable devices include various Ruckus Wireless Unleashed models up to firmware version 200.7.10.102.92.
An attacker can exploit CVE-2020-13916 to execute arbitrary code via an unauthenticated crafted HTTP request.
There are no known workarounds for CVE-2020-13916; updating to a secure firmware version is required.