Ruckus Wireless SmartZone 安全漏洞(CVE-2023-25717)
CVE编号
CVE-2023-25717利用情况
暂无补丁情况
N/A披露时间
2023-02-14漏洞描述
Ruckus Wireless SmartZone是Ruckus公司的高性能WLAN控制器。 Ruckus Wireless Admin 10.4及之前版本存在安全漏洞,该漏洞源于允许通过未经身份验证的HTTP GET请求执行远程代码。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauth... | |
https://support.ruckuswireless.com/security_bulletins/315 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | ruckuswireless | ruckus_wireless_admin | * | Up to (including) 10.4 | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | e510 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | h320 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | h350 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | h500 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | h510 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | h550 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | m510 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | m510-jp | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | p300 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | q410 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | q710 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | q910 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r300 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r310 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r320 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r350 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r500 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r510 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r550 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r560 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r600 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r610 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r650 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r700 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r710 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r720 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r730 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r750 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r760 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | r850 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | sz-144 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | sz-144-federal | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | sz100 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | sz300 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | sz300-federal | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t300 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t301n | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t301s | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t310c | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t310d | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t310n | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t310s | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t350c | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t350d | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t350se | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t504 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t610 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t710 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t710s | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t750 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t750se | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t811-cm | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | t811-cm(non-spf) | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | zd1000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | zd1100 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | zd1200 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | zd3000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | ruckuswireless | zd5000 | - | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-94 | 对生成代码的控制不恰当(代码注入) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论