Start your free trial today.
Protect your organization with cutting-edge cybersecurity solutions designed for resilience and efficiency. Secure your digital assets with confidence.
Your Shield Against Threats
Unleash the Power of Cybersecurity
Boost Your Security, Enhance Your Business
We solve Your Cyber Challenges
Quick Links
Resources
Deepaegis Portals
2025 Deepaegis. All Rights Reserved.
Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring.
Ruckus Wireless Access Point (AP) software contains an unspecified vulnerability in the web services component. If the web services component is enabled on the AP, an attacker can perform cross-site request forgery (CSRF) or remote code execution (RCE). This vulnerability impacts Ruckus ZoneDirector, SmartZone, and Solo APs.
Multiple Products
Affected Version: 10.4
Action Due: 6/2/2023
Remediation: Apply updates per vendor instructions or disconnect product if it is end-of-life.
Exploit Added Date: 5/12/2023
No temporary fixes provided
Apply updates per vendor instructions or disconnect product if it is end-of-life.
No detection methods provided
Not specified
Not specified
No affected organizations specified
This document contains sensitive information. Unauthorized distribution is prohibited.