We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An issue was discovered in CommScope Ruckus Unleashed prior to 200.14.6.1.203 and in Ruckus ZoneDirector, where a path-traversal flaw in the web interface lets the server execute attacker-supplied EJS templates outside permitted directories, allowing a remote unauthenticated attacker who can upload a template (e.g., via FTP) to escalate privileges and run arbitrary template code on the controller.
Reserved 2025-04-22 | Published 2025-07-21 | Updated 2025-07-21 | Assigner mitresupport.ruckuswireless.com/security_bulletins/330
sector7.computest.nl/post/2025-07-ruckus-unleashed/
Support options