TROYANOSYVIRUS
Volver a CVEs

CVE-2020-13916

CRITICAL
9.8

Descripcion

A stack buffer overflow in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.

Detalles CVE

Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado7/28/2020
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0

Productos afectados

ruckuswireless:c110ruckuswireless:e510ruckuswireless:h320ruckuswireless:h510ruckuswireless:m510ruckuswireless:r310ruckuswireless:r320ruckuswireless:r500ruckuswireless:r510ruckuswireless:r600ruckuswireless:r610ruckuswireless:r710ruckuswireless:r720ruckuswireless:r750ruckuswireless:t300ruckuswireless:t301nruckuswireless:t301sruckuswireless:t310cruckuswireless:t310druckuswireless:t310nruckuswireless:t310sruckuswireless:t610ruckuswireless:t710ruckuswireless:t710sruckuswireless:unleashed_firmware

Debilidades (CWE)

CWE-787

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.