Vulnerability Description
An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. The Web Application allows Arbitrary Read/Write actions by authenticated users. The API allows an HTTP POST of arbitrary content into any file on the filesystem as root.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Commscope | Ruckus Iot Controller | <= 1.7.1.0 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2021/May/77Mailing ListThird Party Advisory
- https://korelogic.com/advisories.htmlThird Party Advisory
- http://seclists.org/fulldisclosure/2021/May/77Mailing ListThird Party Advisory
- https://korelogic.com/advisories.htmlThird Party Advisory
FAQ
What is CVE-2021-33217?
CVE-2021-33217 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. The Web Application allows Arbitrary Read/Write actions by authenticated users. The API allows an HTTP POST of arbitrary...
How severe is CVE-2021-33217?
CVE-2021-33217 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-33217?
Check the references section above for vendor advisories and patch information. Affected products include: Commscope Ruckus Iot Controller.