An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where a hidden debug script .ap_debug.sh invoked from the restricted CLI does not properly sanitize its input, allowing an authenticated attacker to execute arbitrary commands as root on the controller or specified target.
| Software | From | Fixed in |
|---|---|---|
| ruckuswireless / ruckus_unleashed | - | 200.15.6.212.14 |
| ruckuswireless / ruckus_unleashed | 200.17 | 200.17.7.0.139 |
| ruckuswireless / ruckus_zonedirector | - | 10.5.1.0.279 |