๐Ÿ” CVE Alert

CVE-2021-4474

MEDIUM 4.9

Ruckus AP CLI Arbitrary File Read Allows Authenticated Remote File Access

CVSS Score
4.9
EPSS Score
0.0%
EPSS Percentile
0th

Ruckus Access Point products contain an arbitrary file read vulnerability in the command-line interface that allows authenticated remote attackers with administrative privileges to read arbitrary files from the underlying filesystem. Attackers can exploit this vulnerability to access sensitive information including configuration files, credentials, and system data stored on the device.

CWE CWE-552
Vendor ruckus wireless
Product ruckus access point
Published Mar 26, 2026
Last Updated Mar 26, 2026
Stay Ahead of the Next One

Get instant alerts for ruckus wireless ruckus access point

Be the first to know when new medium vulnerabilities affecting ruckus wireless ruckus access point are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

Ruckus Wireless / RUCKUS Access Point
0
Ruckus / RUCKUS Unleashed
0
Ruckus / SmartZone 100 (SZ-100) (EOL)
0
Ruckus / SmartZone 100-D (SZ100-D) (EOL)
0
Ruckus / SmartZone 144 (SZ-144)
0
Ruckus / SmartZone 144-Dataplane (SZ144-D)
0
Ruckus / SmartZone 300 (SZ300) (EOL)
0
Ruckus / ZoneDirector 1200 (EOL)
0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
support.ruckuswireless.com: https://support.ruckuswireless.com/security_bulletins/306 vulncheck.com: https://www.vulncheck.com/advisories/ruckus-ap-cli-arbitrary-file-read-allows-authenticated-remote-file-access