Vulnerability Details CVE-2017-6230
Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.058
EPSS Ranking 90.1%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 9.0
Products affected by CVE-2017-6230
-
cpe:2.3:o:ruckuswireless:smartzone_managed_access_point_firmware:r5.0
-
cpe:2.3:o:ruckuswireless:solo_access_point_firmware:r110.0