9.8

CVE-2019-19840

Exploit

A stack-based buffer overflow in zap_parse_args in zap.c in zap in Ruckus Unleashed through 200.7.10.102.64 allows remote code execution via an unauthenticated HTTP request.

Data is provided by the National Vulnerability Database (NVD)
RuckuswirelessUnleashed Version < 200.7.10.202.94
   RuckuswirelessC110 Version-
   RuckuswirelessE510 Version-
   RuckuswirelessH320 Version-
   RuckuswirelessH510 Version-
   RuckuswirelessM510 Version-
   RuckuswirelessR310 Version-
   RuckuswirelessR320 Version-
   RuckuswirelessR510 Version-
   RuckuswirelessR610 Version-
   RuckuswirelessR710 Version-
   RuckuswirelessR720 Version-
   RuckuswirelessT310 Version-
   RuckuswirelessT610 Version-
   RuckuswirelessT710 Version-
RuckuswirelessZonedirector 1200 Firmware Version < 9.10.2.0.84
   RuckuswirelessZonedirector 1200 Version-
RuckuswirelessZonedirector 1200 Firmware Version >= 9.12.0 < 9.12.3.0.136
   RuckuswirelessZonedirector 1200 Version-
RuckuswirelessZonedirector 1200 Firmware Version >= 9.13.0 < 10.0.1.0.90
   RuckuswirelessZonedirector 1200 Version-
RuckuswirelessZonedirector 1200 Firmware Version >= 10.1.0 < 10.1.2.0.275
   RuckuswirelessZonedirector 1200 Version-
RuckuswirelessZonedirector 1200 Firmware Version >= 10.2.0 < 10.2.1.0.147
   RuckuswirelessZonedirector 1200 Version-
RuckuswirelessZonedirector 1200 Firmware Version >= 10.3.0 < 10.3.1.0.21
   RuckuswirelessZonedirector 1200 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 21.7% 0.955
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.