Loading
Generated remediation guidance and an executive summary. No account required.
Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems.
Use CWE-78, Ruckuswireless vendor hub and Solo Access Point Firmware product page to widen CVE-2017-6230 into its surrounding weakness, vendor, and product context.