Product:

H320_firmware

(Ruckuswireless)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 2
Date Id Summary Products Score Patch Annotated
2023-12-07 CVE-2023-49225 A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section. C110_firmware, E510_firmware, H320_firmware, H350_firmware, H510_firmware, H550_firmware, M510_firmware, R310_firmware, R320_firmware, R350_firmware, R510_firmware, R550_firmware, R560_firmware, R610_firmware, R650_firmware, R710_firmware, R720_firmware, R730_firmware, R750_firmware, R760_firmware, R850_firmware, Smartzone_firmware, T305_firmware, T310c_firmware, T310d_firmware, T310n_firmware, T310s_firmware, T350c_firmware, T350d_firmware, T350se_firmware, T610_firmware, T610s_firmware, T710_firmware, T710s_firmware, T750_firmware, T750se_firmware, Zonedirector_firmware 6.1
2018-02-14 CVE-2017-6229 Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems. H320_firmware, H510_firmware, R310_firmware, R500_firmware, R510_firmware, R600_firmware, R710_firmware, R720_firmware, T300_firmware, T300e_firmware, T301_firmware, T610_firmware, T710_firmware, Zonedirector_1200_firmware, Zonedirector_3000_firmware 8.8