CVE-2019-19843
CRITICALRuckus Wireless Unleashed <200.7.10.102.64 - Info Disclosure
Title source: llmDescription
Incorrect access control in the web interface in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote credential fetch via an unauthenticated HTTP request involving a symlink with /tmp and web/user/wps_tool_cache.
Scores
CVSS v3
9.8
EPSS
0.0065
EPSS Percentile
70.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-552
CWE-522
Status
published
Affected Products (2)
ruckuswireless/unleashed
< 200.7.10.202.94
ruckuswireless/zonedirector_1200_firmware
< 9.10.2.0.84
Timeline
Published
Jan 22, 2020
Tracked Since
Feb 18, 2026