Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway mode is enabled. Attackers can exploit this vulnerability by sending specially crafted requests through the management interface to achieve arbitrary code execution on affected systems.
History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Ruckusnetworks
Ruckusnetworks ruckus C110
Ruckusnetworks ruckus E510
Ruckusnetworks ruckus H320
Ruckusnetworks ruckus H350
Ruckusnetworks ruckus H510
Ruckusnetworks ruckus H550
Ruckusnetworks ruckus M510-jp
Ruckusnetworks ruckus R320
Ruckusnetworks ruckus R350
Ruckusnetworks ruckus R510
Ruckusnetworks ruckus R550
Ruckusnetworks ruckus R610
Ruckusnetworks ruckus R650
Ruckusnetworks ruckus R710
Ruckusnetworks ruckus R720
Ruckusnetworks ruckus R750
Ruckusnetworks ruckus R850
Ruckusnetworks ruckus T310c
Ruckusnetworks ruckus T310d
Ruckusnetworks ruckus T310n
Ruckusnetworks ruckus T310s
Ruckusnetworks ruckus T350c
Ruckusnetworks ruckus T350d
Ruckusnetworks ruckus T350se
Ruckusnetworks ruckus T610
Ruckusnetworks ruckus T710
Ruckusnetworks ruckus T710s
Ruckusnetworks ruckus T750
Ruckusnetworks ruckus T750se
Ruckusnetworks ruckus Unleashed
Vendors & Products Ruckusnetworks
Ruckusnetworks ruckus C110
Ruckusnetworks ruckus E510
Ruckusnetworks ruckus H320
Ruckusnetworks ruckus H350
Ruckusnetworks ruckus H510
Ruckusnetworks ruckus H550
Ruckusnetworks ruckus M510-jp
Ruckusnetworks ruckus R320
Ruckusnetworks ruckus R350
Ruckusnetworks ruckus R510
Ruckusnetworks ruckus R550
Ruckusnetworks ruckus R610
Ruckusnetworks ruckus R650
Ruckusnetworks ruckus R710
Ruckusnetworks ruckus R720
Ruckusnetworks ruckus R750
Ruckusnetworks ruckus R850
Ruckusnetworks ruckus T310c
Ruckusnetworks ruckus T310d
Ruckusnetworks ruckus T310n
Ruckusnetworks ruckus T310s
Ruckusnetworks ruckus T350c
Ruckusnetworks ruckus T350d
Ruckusnetworks ruckus T350se
Ruckusnetworks ruckus T610
Ruckusnetworks ruckus T710
Ruckusnetworks ruckus T710s
Ruckusnetworks ruckus T750
Ruckusnetworks ruckus T750se
Ruckusnetworks ruckus Unleashed

Thu, 26 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway mode is enabled. Attackers can exploit this vulnerability by sending specially crafted requests through the management interface to achieve arbitrary code execution on affected systems.
Title Ruckus Unleashed Authenticated RCE in Gateway Mode
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-03-26T19:20:53.252Z

Updated: 2026-03-26T19:20:53.252Z

Reserved: 2026-03-23T16:18:41.704Z

Link: CVE-2023-7338

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-26T20:16:08.853

Modified: 2026-03-26T20:16:08.853

Link: CVE-2023-7338

cve-icon Redhat

No data.