Product:

R310_firmware

(Ruckuswireless)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 13
Date Id Summary Products Score Patch Annotated
2023-12-07 CVE-2023-49225 A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section. C110_firmware, E510_firmware, H320_firmware, H350_firmware, H510_firmware, H550_firmware, M510_firmware, R310_firmware, R320_firmware, R350_firmware, R510_firmware, R550_firmware, R560_firmware, R610_firmware, R650_firmware, R710_firmware, R720_firmware, R730_firmware, R750_firmware, R760_firmware, R850_firmware, Smartzone_firmware, T305_firmware, T310c_firmware, T310d_firmware, T310n_firmware, T310s_firmware, T350c_firmware, T350d_firmware, T350se_firmware, T610_firmware, T610s_firmware, T710_firmware, T710s_firmware, T750_firmware, T750se_firmware, Zonedirector_firmware 6.1
2020-01-19 CVE-2020-7234 Ruckus ZoneFlex R310 104.0.0.0.1347 devices allow Stored XSS via the SSID field on the Configuration > Radio 2.4G > Wireless X screen (after a successful login to the super account). R310_firmware 4.8