CVE-2021-4474
Ruckus AP CLI Arbitrary File Read Allows Authenticated Remote File Access
CVSS Score
4.9
EPSS Score
0.0%
EPSS Percentile
0th
Ruckus Access Point products contain an arbitrary file read vulnerability in the command-line interface that allows authenticated remote attackers with administrative privileges to read arbitrary files from the underlying filesystem. Attackers can exploit this vulnerability to access sensitive information including configuration files, credentials, and system data stored on the device.
| CWE | CWE-552 |
| Vendor | ruckus wireless |
| Product | ruckus access point |
| Published | Mar 26, 2026 |
| Last Updated | Mar 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for ruckus wireless ruckus access point
Be the first to know when new medium vulnerabilities affecting ruckus wireless ruckus access point are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Affected Versions
Ruckus Wireless / RUCKUS Access Point
0
Ruckus / RUCKUS Unleashed
0
Ruckus / SmartZone 100 (SZ-100) (EOL)
0
Ruckus / SmartZone 100-D (SZ100-D) (EOL)
0
Ruckus / SmartZone 144 (SZ-144)
0
Ruckus / SmartZone 144-Dataplane (SZ144-D)
0
Ruckus / SmartZone 300 (SZ300) (EOL)
0
Ruckus / ZoneDirector 1200 (EOL)
0