vendor:
Ruckus IoT Controller (Ruckus vRIoT)
by:
Emre SUREN
8.8
CVSS
HIGH
Command Injection & Broken Authentication
78, 287
CWE
Product Name: Ruckus IoT Controller (Ruckus vRIoT)
Affected Version From: 1.5.1.0.21
Affected Version To: 1.5.1.0.21
Patch Exists: YES
Related CWE: CVE-2020-26878
CPE: 2.3:a:ruckus_wireless:ruckus_iot_controller:1.5.1.0.21
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Appliance
2020
Ruckus IoT Controller (Ruckus vRIoT) 1.5.1.0.21 – Remote Code Execution
A vulnerability in Ruckus IoT Controller (Ruckus vRIoT) version 1.5.1.0.21 allows an attacker to execute arbitrary code remotely. This is due to the lack of authentication and authorization checks in the createUser API endpoint. An attacker can send a malicious payload in the username parameter of the API request and gain remote code execution.
Mitigation:
Upgrade to the latest version of Ruckus IoT Controller (Ruckus vRIoT) and ensure that authentication and authorization checks are properly implemented in the createUser API endpoint.