Product:

Zonedirector_1200_firmware

(Ruckuswireless)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 21
Date Id Summary Products Score Patch Annotated
2020-01-23 CVE-2019-19837 Incorrect access control in the web interface in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote information disclosure of bin/web.conf via HTTP requests. Unleashed, Zonedirector_1200_firmware 5.3
2020-01-22 CVE-2019-19841 emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=packet-capture to admin/_cmdstat.jsp via the mac attribute. Unleashed, Zonedirector_1200_firmware N/A
2020-01-22 CVE-2019-19842 emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=spectra-analysis to admin/_cmdstat.jsp via the mac attribute. Unleashed, Zonedirector_1200_firmware N/A
2020-01-22 CVE-2019-19840 A stack-based buffer overflow in zap_parse_args in zap.c in zap in Ruckus Unleashed through 200.7.10.102.64 allows remote code execution via an unauthenticated HTTP request. Unleashed, Zonedirector_1200_firmware N/A
2020-01-23 CVE-2019-19835 SSRF in AjaxRestrictedCmdStat in zap in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote denial of service via the server attribute to the tools/_rcmdstat.jsp URI. Unleashed, Zonedirector_1200_firmware N/A
2020-01-22 CVE-2019-19836 AjaxRestrictedCmdStat in zap in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote code execution via a POST request that uses tools/_rcmdstat.jsp to write to a specified filename. Unleashed, Zonedirector_1200_firmware N/A
2020-01-22 CVE-2019-19834 Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter. Unleashed, Zonedirector_1200_firmware N/A
2020-01-23 CVE-2019-19839 emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=import-category to admin/_cmdstat.jsp via the uploadFile attribute. Unleashed, Zonedirector_1200_firmware N/A
2020-01-23 CVE-2019-19838 emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=get-platform-depends to admin/_cmdstat.jsp via the uploadFile attribute. Unleashed, Zonedirector_1200_firmware N/A
2018-02-14 CVE-2017-6229 Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems. H320_firmware, H510_firmware, R310_firmware, R500_firmware, R510_firmware, R600_firmware, R710_firmware, R720_firmware, T300_firmware, T300e_firmware, T301_firmware, T610_firmware, T710_firmware, Zonedirector_1200_firmware, Zonedirector_3000_firmware 8.8