CVE-2019-19841

emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=packet-capture to admin/_cmdstat.jsp via the mac attribute.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ruckuswireless:unleashed:*:*:*:*:*:*:*:*
OR cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:t310:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-01-22 21:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-19841

Mitre link : CVE-2019-19841

CVE.ORG link : CVE-2019-19841


JSON object : View

Products Affected

ruckuswireless

  • t710
  • r310
  • t310
  • h510
  • e510
  • t610
  • r720
  • r510
  • m510
  • r610
  • r710
  • zonedirector_1200
  • r320
  • c110
  • unleashed
  • zonedirector_1200_firmware
  • h320
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')