Loading
Generated remediation guidance and an executive summary. No account required.
Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.
Use CWE-22, Ruckuswireless vendor hub and Unleashed product page to widen CVE-2019-19834 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2019-19839, CVE-2019-19838 and CVE-2019-19842 for nearby disclosures in the same product family.