CVE-2019-19834

Severity CVSS v4.0:
Pending analysis
Type:
CWE-22 Path Traversal
Publication date:
22/01/2020
Last modified:
23/01/2020

Description

Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:ruckuswireless:unleashed:*:*:*:*:*:*:*:* 200.7.10.202.94 (excluding)
cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:t310:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*