Ruckus Access Point products contain an arbitrary file read vulnerability in the command-line interface that allows authenticated remote attackers with administrative privileges to read arbitrary files from the underlying filesystem. Attackers can exploit this vulnerability to access sensitive information including configuration files, credentials, and system data stored on the device.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Ruckus
Ruckus ruckus Unleashed
Ruckus smartzone 100-d (sz100-d) (eol)
Ruckus smartzone 100 (sz-100) (eol)
Ruckus smartzone 144-dataplane (sz144-d)
Ruckus smartzone 144 (sz-144)
Ruckus smartzone 300 (sz300) (eol)
Ruckus zonedirector 1200 (eol)
Ruckuswireless
Ruckuswireless ruckus Access Point
Vendors & Products Ruckus
Ruckus ruckus Unleashed
Ruckus smartzone 100-d (sz100-d) (eol)
Ruckus smartzone 100 (sz-100) (eol)
Ruckus smartzone 144-dataplane (sz144-d)
Ruckus smartzone 144 (sz-144)
Ruckus smartzone 300 (sz300) (eol)
Ruckus zonedirector 1200 (eol)
Ruckuswireless
Ruckuswireless ruckus Access Point

Thu, 26 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description Ruckus Access Point products contain an arbitrary file read vulnerability in the command-line interface that allows authenticated remote attackers with administrative privileges to read arbitrary files from the underlying filesystem. Attackers can exploit this vulnerability to access sensitive information including configuration files, credentials, and system data stored on the device.
Title Ruckus AP CLI Arbitrary File Read Allows Authenticated Remote File Access
Weaknesses CWE-552
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-26T19:57:52.098Z

Reserved: 2026-03-23T17:39:23.925Z

Link: CVE-2021-4474

cve-icon Vulnrichment

Updated: 2026-03-26T19:57:12.924Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T20:16:07.730

Modified: 2026-03-30T13:26:50.827

Link: CVE-2021-4474

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:25:29Z

Weaknesses