First published: Tue Jul 28 2020(Updated: )
A stack buffer overflow in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruckuswireless Unleashed Firmware | <=200.7.10.102.92 | |
Ruckuswireless C110 | ||
Ruckuswireless E510 | ||
Ruckuswireless H320 | ||
Ruckuswireless H510 | ||
Ruckuswireless M510 | ||
Ruckuswireless R310 | ||
Ruckuswireless R320 | ||
Ruckuswireless R500 | ||
Ruckuswireless R510 | ||
Ruckuswireless R600 | ||
Ruckuswireless R610 | ||
Ruckuswireless R710 | ||
Ruckuswireless R720 | ||
Ruckuswireless R750 | ||
Ruckuswireless T300 | ||
Ruckuswireless T301n | ||
Ruckuswireless T301s | ||
Ruckuswireless T310c | ||
Ruckuswireless T310d | ||
Ruckuswireless T310n | ||
Ruckuswireless T310s | ||
Ruckuswireless T610 | ||
Ruckuswireless T710 | ||
Ruckuswireless T710s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.