Vulnerability Details CVE-2019-19834
Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.013
EPSS Ranking 78.9%
CVSS Severity
CVSS v3 Score 7.2
CVSS v2 Score 6.5
Products affected by CVE-2019-19834
-
cpe:2.3:h:ruckuswireless:c110:-
-
cpe:2.3:h:ruckuswireless:e510:-
-
cpe:2.3:h:ruckuswireless:h320:-
-
cpe:2.3:h:ruckuswireless:h510:-
-
cpe:2.3:h:ruckuswireless:m510:-
-
cpe:2.3:h:ruckuswireless:r310:-
-
cpe:2.3:h:ruckuswireless:r320:-
-
cpe:2.3:h:ruckuswireless:r510:-
-
cpe:2.3:h:ruckuswireless:r610:-
-
cpe:2.3:h:ruckuswireless:r710:-
-
cpe:2.3:h:ruckuswireless:r720:-
-
cpe:2.3:h:ruckuswireless:t310:-
-
cpe:2.3:h:ruckuswireless:t610:-
-
cpe:2.3:h:ruckuswireless:t710:-
-
cpe:2.3:h:ruckuswireless:zonedirector_1200:-
-
cpe:2.3:o:ruckuswireless:unleashed:*
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:-
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.0.1.0.17
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.0.1.0.44
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.1.0
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.1.0.0.1515
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.0
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.3.0
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:9.10.2.0.11
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:9.10.2.0.53
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:9.12.0
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:9.12.3.0.28
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:9.12.3.0.83
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:9.13.0
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:9.13.3.0.145
-
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:9.13.3.0.22