Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
References
Link Resource
https://adepts.of0x.cc Third Party Advisory
https://adepts.of0x.cc/ruckus-vriot-rce/ Exploit Third Party Advisory
https://support.ruckuswireless.com/documents Vendor Advisory
https://support.ruckuswireless.com/security_bulletins/305 Product Vendor Advisory
https://twitter.com/TheXC3LL Third Party Advisory
https://x-c3ll.github.io Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-10-26T19:13:47

Updated: 2020-10-26T19:13:47

Reserved: 2020-10-07T00:00:00


Link: CVE-2020-26878

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-10-26T20:15:14.473

Modified: 2021-07-21T11:39:23.747


Link: CVE-2020-26878

JSON object: View

cve-icon Redhat Information

No data.

CWE