6.1

CVE-2023-49225

A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.

Data is provided by the National Vulnerability Database (NVD)
RuckuswirelessR750 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessR750 Version-
RuckuswirelessR650 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessR650 Version-
RuckuswirelessR730 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessR730 Version-
RuckuswirelessT750 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessT750 Version-
RuckuswirelessR510 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessR510 Version-
RuckuswirelessE510 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessE510 Version-
RuckuswirelessC110 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessC110 Version-
RuckuswirelessR320 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessR320 Version-
RuckuswirelessH510 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessH510 Version-
RuckuswirelessH320 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessH320 Version-
RuckuswirelessT305 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessT305 Version-
RuckuswirelessM510 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessM510 Version-
RuckuswirelessR720 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessR720 Version-
RuckuswirelessR710 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessR710 Version-
RuckuswirelessT710 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessT710 Version-
RuckuswirelessT610 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessT610 Version-
RuckuswirelessR610 Firmware Version <= 114.0.0.0.6565
   RuckuswirelessR610 Version-
RuckuswirelessT310d Firmware Version <= 114.0.0.0.6565
   RuckuswirelessT310d Version-
RuckuswirelessT310s Firmware Version <= 114.0.0.0.6565
   RuckuswirelessT310s Version-
RuckuswirelessT310n Firmware Version <= 114.0.0.0.6565
   RuckuswirelessT310n Version-
RuckuswirelessT310c Firmware Version <= 114.0.0.0.6565
   RuckuswirelessT310c Version-
RuckuswirelessT710s Firmware Version <= 114.0.0.0.6565
   RuckuswirelessT710s Version-
RuckuswirelessT610s Firmware Version <= 114.0.0.0.6565
   RuckuswirelessT610s Version-
RuckuswirelessR550 Firmware Version <= 114.0.0.0.5585
   RuckuswirelessR550 Version-
RuckuswirelessR850 Firmware Version <= 114.0.0.0.5585
   RuckuswirelessR850 Version-
RuckuswirelessT750se Firmware Version <= 114.0.0.0.5585
   RuckuswirelessT750se Version-
RuckuswirelessR310 Firmware Version <= 110.0.0.0.2014
   RuckuswirelessR310
RuckuswirelessR760 Firmware Version <= 118.1.0.0.1274
   RuckuswirelessR760
RuckuswirelessR760 Firmware Version <= 118.1.0.0.1274
   RuckuswirelessR760
RuckuswirelessR560 Firmware Version <= 118.1.0.0.1908
   RuckuswirelessR560
RuckuswirelessH550 Firmware Version <= 116.0.0.0.1506
   RuckuswirelessH550
RuckuswirelessH350 Firmware Version <= 116.0.0.0.3128
   RuckuswirelessH350
RuckuswirelessT350c Firmware Version <= 116.0.0.0.1543
RuckuswirelessT350d Firmware Version <= 116.0.0.0.1543
RuckuswirelessT350se Firmware Version <= 116.0.0.0.3136
RuckuswirelessR350 Firmware Version <= 116.0.0.0.1655
   RuckuswirelessR350
RuckuswirelessSmartzone Firmware Version <= 6.1.1
   CommscopeRuckus Smartzone Version-
RuckuswirelessZonedirector Firmware Version <= 10.5.1
   RuckuswirelessZonedirector Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.32% 0.544
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.1 2.8 2.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
134c704f-9b21-4f2e-91b3-4a467353bcc0 6.1 2.8 2.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.