Product:

Zonedirector_firmware

(Ruckuswireless)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 3
Date Id Summary Products Score Patch Annotated
2023-12-07 CVE-2023-49225 A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section. C110_firmware, E510_firmware, H320_firmware, H350_firmware, H510_firmware, H550_firmware, M510_firmware, R310_firmware, R320_firmware, R350_firmware, R510_firmware, R550_firmware, R560_firmware, R610_firmware, R650_firmware, R710_firmware, R720_firmware, R730_firmware, R750_firmware, R760_firmware, R850_firmware, Smartzone_firmware, T305_firmware, T310c_firmware, T310d_firmware, T310n_firmware, T310s_firmware, T350c_firmware, T350d_firmware, T350se_firmware, T610_firmware, T610s_firmware, T710_firmware, T710s_firmware, T750_firmware, T750se_firmware, Zonedirector_firmware 6.1
2022-06-27 CVE-2020-21161 Cross Site Scripting (XSS) vulnerability in Ruckus Wireless ZoneDirector 9.8.3.0. Zonedirector_firmware 6.1
2017-10-13 CVE-2017-6224 Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request. Unleashed_firmware, Zonedirector_firmware 8.8