Authenticated Root Command Injection in Ruckus Networks Access Points
CVE-2017-6230
Key Information:
- Vendor
- CVE Published:
- 14 February 2018
What is CVE-2017-6230?
The vulnerability found in Ruckus Networks Solo Access Points and SZ managed Access Points allows authenticated users to execute privileged commands through the web GUI. This flaw affects firmware versions R110.x and earlier for Solo APs, as well as R5.x and earlier for SZ managed APs. Successful exploitation could enable an authenticated attacker to gain unauthorized control over the device, potentially compromising the integrity of the network. Users are advised to update their firmware to the latest versions to mitigate this risk.
Affected Version(s)
Ruckus Networks Solo APs and SZ managed APs Solo AP firmware releases R110.x or before and SZ managed APs firmware release R5.x or before
References
EPSS Score
5% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved