|
|||
Rule General Information |
---|
Release Date: | 2022-06-29 | |
Rule Name: | Ruckus IoT Controller Web UI createUser Remote Command Injection Vulnerability (CVE-2020-26878) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://adepts.of0x.cc https://adepts.of0x.cc/ruckus-vriot-rce/ https://support.ruckuswireless.com/documents https://support.ruckuswireless.com/security_bulletins/305 |
|
Solutions |
---|
The vendor has released upgrade patches to fix vulnerabilities, please visit: https://support.ruckuswireless.com/security_bulletins/305 |