Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway mode is enabled. Attackers can exploit this vulnerability by sending specially crafted requests through the management interface to achieve arbitrary code execution on affected systems.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Ruckusnetworks
Ruckusnetworks ruckus C110
Ruckusnetworks ruckus E510
Ruckusnetworks ruckus H320
Ruckusnetworks ruckus H350
Ruckusnetworks ruckus H510
Ruckusnetworks ruckus H550
Ruckusnetworks ruckus M510-jp
Ruckusnetworks ruckus R320
Ruckusnetworks ruckus R350
Ruckusnetworks ruckus R510
Ruckusnetworks ruckus R550
Ruckusnetworks ruckus R610
Ruckusnetworks ruckus R650
Ruckusnetworks ruckus R710
Ruckusnetworks ruckus R720
Ruckusnetworks ruckus R750
Ruckusnetworks ruckus R850
Ruckusnetworks ruckus T310c
Ruckusnetworks ruckus T310d
Ruckusnetworks ruckus T310n
Ruckusnetworks ruckus T310s
Ruckusnetworks ruckus T350c
Ruckusnetworks ruckus T350d
Ruckusnetworks ruckus T350se
Ruckusnetworks ruckus T610
Ruckusnetworks ruckus T710
Ruckusnetworks ruckus T710s
Ruckusnetworks ruckus T750
Ruckusnetworks ruckus T750se
Ruckusnetworks ruckus Unleashed
Vendors & Products Ruckusnetworks
Ruckusnetworks ruckus C110
Ruckusnetworks ruckus E510
Ruckusnetworks ruckus H320
Ruckusnetworks ruckus H350
Ruckusnetworks ruckus H510
Ruckusnetworks ruckus H550
Ruckusnetworks ruckus M510-jp
Ruckusnetworks ruckus R320
Ruckusnetworks ruckus R350
Ruckusnetworks ruckus R510
Ruckusnetworks ruckus R550
Ruckusnetworks ruckus R610
Ruckusnetworks ruckus R650
Ruckusnetworks ruckus R710
Ruckusnetworks ruckus R720
Ruckusnetworks ruckus R750
Ruckusnetworks ruckus R850
Ruckusnetworks ruckus T310c
Ruckusnetworks ruckus T310d
Ruckusnetworks ruckus T310n
Ruckusnetworks ruckus T310s
Ruckusnetworks ruckus T350c
Ruckusnetworks ruckus T350d
Ruckusnetworks ruckus T350se
Ruckusnetworks ruckus T610
Ruckusnetworks ruckus T710
Ruckusnetworks ruckus T710s
Ruckusnetworks ruckus T750
Ruckusnetworks ruckus T750se
Ruckusnetworks ruckus Unleashed

Thu, 26 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway mode is enabled. Attackers can exploit this vulnerability by sending specially crafted requests through the management interface to achieve arbitrary code execution on affected systems.
Title Ruckus Unleashed Authenticated RCE in Gateway Mode
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-27T21:55:37.051Z

Reserved: 2026-03-23T16:18:41.704Z

Link: CVE-2023-7338

cve-icon Vulnrichment

Updated: 2026-03-27T21:55:32.806Z

cve-icon NVD

Status : Received

Published: 2026-03-26T20:16:08.853

Modified: 2026-03-26T20:16:08.853

Link: CVE-2023-7338

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:25:32Z

Weaknesses