CVE-2017-6224
https://notcve.org/view.php?id=CVE-2017-6224
Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request. Ruckus Wireless Zone Director Controller en distribuciones de firmware ZD10.0.0.x, ZD10.0.1.x (anteriores a la distribución 10.0.1.0.17 MR1) y Ruckus Wireless Unleashed AP Firmware, distribuciones 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x., contienen vulnerabilidades de inyección de comandos del sistema operativo que podrían permitir que usuarios locales autenticados ejecuten comandos arbitrarios con privilegios en el sistema operativo subyacente anexando esos comandos en el campo Common Name en Certificate Generation Request. • https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2013-5030 – Ruckus Wireless Zoneflex 2942 Wireless Access Point - Authentication Bypass
https://notcve.org/view.php?id=CVE-2013-5030
Ruckus Wireless Zoneflex 2942 devices with firmware 9.6.0.0.267 allow remote attackers to bypass authentication, and subsequently access certain configuration/ and maintenance/ scripts, by constructing a crafted URI after receiving an authentication error for an arbitrary login attempt. Los dispositivos Ruckus Wireless Zoneflex con firmware 9.6.0.0.267 permite a atacantes remotos evadir la autenticación, y posteriormente acceder a los scripts configuration/ y maintenance/, mediante la construcción de un URI diseñado después de recibir un error de autenticación por un intento arbitrario de inicio de sesión. Ruckus Wireless Zoneflex 2942 wireless access point suffers from an authentication bypass vulnerability. • https://www.exploit-db.com/exploits/29709 http://www.kb.cert.org/vuls/id/742932 • CWE-264: Permissions, Privileges, and Access Controls •