Ruckus Wireless H500 web management interface authenticated command injection
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://bitbucket.org/dudux/ruckus-rootshell | third party advisory exploit |
http://b910a83a1a1fa9c20d93-2435f2f08e773abe005b52170fce6d94.r84.cf2.rackcdn.com/security/faq-security-advisory-id-062117.txt | |
http://www.securityfocus.com/bid/93539 | vdb entry third party advisory |
http://www.tripwire.com/state-of-security/vulnerability-management/ruckus-vulnerability/ | third party advisory technical description |