A stack-based buffer overflow in zap_parse_args in zap.c in zap in Ruckus Unleashed through 200.7.10.102.64 allows remote code execution via an unauthenticated HTTP request.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10816.html | third party advisory |
https://www.ruckuswireless.com/security/299/view/txt | vendor advisory |
https://alephsecurity.com/2020/01/14/ruckus-wireless | exploit third party advisory technical description |