First published: Wed Jul 07 2021(Updated: )
An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. The Web Application allows Arbitrary Read/Write actions by authenticated users. The API allows an HTTP POST of arbitrary content into any file on the filesystem as root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CommScope Ruckus IoT Controller | <=1.7.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-33217 is critical with a CVSS score of 8.8.
The affected software for CVE-2021-33217 is CommScope Ruckus IoT Controller version 1.7.1.0 and earlier.
Authenticated users can perform Arbitrary Read/Write actions in the Web Application of CVE-2021-33217.
The API of CVE-2021-33217 allows an HTTP POST of arbitrary content into any file on the filesystem as root.
Yes, you can find references for CVE-2021-33217 at the following links: [http://seclists.org/fulldisclosure/2021/May/77](http://seclists.org/fulldisclosure/2021/May/77) and [https://korelogic.com/advisories.html](https://korelogic.com/advisories.html).