2 results (0.006 seconds)

CVSS: 10.0EPSS: 38%CPEs: 2EXPL: 1

Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header. Ruckus vRioT versiones hasta 1.5.1.0.21, presenta una puerta trasera de API que está embebida en el archivo validate_token.py. Un atacante no autenticado puede interactuar con la API de servicio al usar un valor de backdoor como el encabezado Authorization • https://adepts.of0x.cc https://adepts.of0x.cc/ruckus-vriot-rce https://support.ruckuswireless.com/documents https://support.ruckuswireless.com/security_bulletins/305 https://twitter.com/TheXC3LL https://x-c3ll.github.io • CWE-798: Use of Hard-coded Credentials •

CVSS: 9.0EPSS: 90%CPEs: 2EXPL: 2

Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py. Ruckus versiones hasta 1.5.1.0.21, está afectado por una inyección de comandos remota. Un usuario autenticado puede enviar una consulta a la API (endpoint /service/v1/createUser), inyectando comandos arbitrarios que serán ejecutados como usuario root por medio del archivo web.py • https://github.com/htarsoo/CVE-2020-26878 https://adepts.of0x.cc https://adepts.of0x.cc/ruckus-vriot-rce https://support.ruckuswireless.com/documents https://support.ruckuswireless.com/security_bulletins/305 https://twitter.com/TheXC3LL https://x-c3ll.github.io • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •