We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139 and in Ruckus ZoneDirector prior to 10.5.1.0.279, where hard-coded credentials for the ftpuser account provide FTP access to the controller, enabling a remote attacker to upload or retrieve arbitrary files from writable firmware directories and thereby expose sensitive information or compromise the controller.
Reserved 2025-04-22 | Published 2025-07-21 | Updated 2025-07-21 | Assigner mitresupport.ruckuswireless.com/security_bulletins/330
sector7.computest.nl/post/2025-07-ruckus-unleashed/
Support options