cpe:/o:ruckuswireless:unleashed_firmware:200.1 cpe:/o:ruckuswireless:unleashed_firmware:200.1.9.12.55 cpe:/o:ruckuswireless:unleashed_firmware:200.3 cpe:/o:ruckuswireless:unleashed_firmware:200.3.9.13.228 cpe:/o:ruckuswireless:unleashed_firmware:200.4.9.13 cpe:/o:ruckuswireless:unleashed_firmware:200.4.9.13.47 cpe:/o:ruckuswireless:zonedirector_firmware:zd9.9.0.0.205 cpe:/o:ruckuswireless:zonedirector_firmware:zd9.9.0.0.212 cpe:/o:ruckuswireless:zonedirector_firmware:zd9.9.0.0.216 cpe:/o:ruckuswireless:zonedirector_firmware:zd9.10.0.0.218 cpe:/o:ruckuswireless:zonedirector_firmware:zd9.13.0.0.103 cpe:/o:ruckuswireless:zonedirector_firmware:zd9.13.0.0.209 CVE-2017-6224 2017-10-13T13:29:01.160-04:00 2019-10-02T20:03:26.223-04:00 9.3 NETWORK MEDIUM NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2017-11-01T14:39:15.460-04:00 CONFIRM https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request.