CVE-2020-13915
HIGHRuckuswireless Unleashed Firmware - Insufficiently Protected Creden...
Title source: ruleDescription
Insecure permissions in emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allow a remote attacker to overwrite admin credentials via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
References (1)
Core 1
Core References
Vendor Advisory x_refsource_confirm
https://support.ruckuswireless.com/security_bulletins/304
Scores
CVSS v3
7.5
EPSS
0.0030
EPSS Percentile
53.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-522
CWE-732
Status
published
Products (1)
ruckuswireless/unleashed_firmware
< 200.7.10.102.92
Published
Jul 28, 2020
Tracked Since
Feb 18, 2026