emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=import-category to admin/_cmdstat.jsp via the uploadFile attribute.
References
Link | Resource |
---|---|
https://alephsecurity.com/2020/01/14/ruckus-wireless | Exploit Technical Description Third Party Advisory |
https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10816.html | Third Party Advisory |
https://www.ruckuswireless.com/security/299/view/txt | Vendor Advisory |
https://alephsecurity.com/2020/01/14/ruckus-wireless | Exploit Technical Description Third Party Advisory |
https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10816.html | Third Party Advisory |
https://www.ruckuswireless.com/security/299/view/txt | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://alephsecurity.com/2020/01/14/ruckus-wireless - Exploit, Technical Description, Third Party Advisory | |
References | () https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10816.html - Third Party Advisory | |
References | () https://www.ruckuswireless.com/security/299/view/txt - Vendor Advisory |
Information
Published : 2020-01-23 15:15
Updated : 2024-11-21 04:35
NVD link : CVE-2019-19839
Mitre link : CVE-2019-19839
CVE.ORG link : CVE-2019-19839
JSON object : View
Products Affected
ruckuswireless
- m510
- r510
- e510
- r710
- h510
- unleashed
- h320
- r610
- t710
- r310
- zonedirector_1200_firmware
- c110
- zonedirector_1200
- t310
- t610
- r320
- r720
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')