Remote Code Execution Vulnerability in Ruckus Wireless Unleashed
CVE-2019-19839
9.8CRITICAL
Summary
A vulnerability in Ruckus Wireless Unleashed allows remote attackers to execute operating system commands. This occurs through a POST request that uses the attribute xcmd=import-category targeting admin/_cmdstat.jsp via the uploadFile parameter. This vulnerability exposes the system to potential unauthorized access and control, with attackers capable of issuing malicious commands, compromising the integrity and security of the device. It is essential for users of affected versions to apply updates or patches as provided by Ruckus Wireless to mitigate this security risk.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved