Lucene search

K
CommscopeRuckus Iot Controller

7 matches found

CVE
CVE
added 2021/07/07 3:15 p.m.99 views

CVE-2021-33221

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Unauthenticated API Endpoints.

9.8CVSS9.4AI score0.90894EPSS
CVE
CVE
added 2021/07/07 3:15 p.m.74 views

CVE-2021-33220

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. Hard-coded API Keys exist.

7.8CVSS7.5AI score0.00047EPSS
CVE
CVE
added 2021/07/07 3:15 p.m.73 views

CVE-2021-33219

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Hard-coded Web Application Administrator Passwords for the admin and nplus1user accounts.

9.8CVSS9.3AI score0.00706EPSS
CVE
CVE
added 2021/07/07 3:15 p.m.72 views

CVE-2021-33217

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. The Web Application allows Arbitrary Read/Write actions by authenticated users. The API allows an HTTP POST of arbitrary content into any file on the filesystem as root.

9CVSS9.1AI score0.00477EPSS
CVE
CVE
added 2021/07/07 3:15 p.m.69 views

CVE-2021-33215

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. The API allows Directory Traversal.

4.3CVSS6.6AI score0.00126EPSS
CVE
CVE
added 2021/07/07 3:15 p.m.68 views

CVE-2021-33216

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. An Undocumented Backdoor exists, allowing shell access via a developer account.

9.8CVSS9.3AI score0.23EPSS
CVE
CVE
added 2021/07/07 3:15 p.m.67 views

CVE-2021-33218

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Hard-coded System Passwords that provide shell access.

10CVSS9.3AI score0.0125EPSS