CVE-2020-13915

HIGH

Ruckuswireless Unleashed Firmware - Insufficiently Protected Creden...

Title source: rule
STIX 2.1

Description

Insecure permissions in emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allow a remote attacker to overwrite admin credentials via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.

References (1)

Core 1
Core References
Vendor Advisory x_refsource_confirm
https://support.ruckuswireless.com/security_bulletins/304

Scores

CVSS v3 7.5
EPSS 0.0030
EPSS Percentile 53.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Details

CWE
CWE-522 CWE-732
Status published
Products (1)
ruckuswireless/unleashed_firmware < 200.7.10.102.92
Published Jul 28, 2020
Tracked Since Feb 18, 2026