CVE-2019-19834
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
22/01/2020
Last modified:
23/01/2020
Description
Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.
Impact
Base Score 3.x
7.20
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:ruckuswireless:unleashed:*:*:*:*:*:*:*:* | 200.7.10.202.94 (excluding) | |
cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:t310:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page