VYPR
Unrated severityNVD Advisory· Published Mar 26, 2026· Updated Mar 26, 2026

Ruckus AP CLI Arbitrary File Read Allows Authenticated Remote File Access

CVE-2021-4474

Description

Ruckus Access Point products contain an arbitrary file read vulnerability in the command-line interface that allows authenticated remote attackers with administrative privileges to read arbitrary files from the underlying filesystem. Attackers can exploit this vulnerability to access sensitive information including configuration files, credentials, and system data stored on the device.

Affected products

9
  • Ruckus/RUCKUS Unleashedv5
    Range: 0
  • Ruckus/SmartZone 100-D (SZ100-D) (EOL)v5
    Range: 0
  • Ruckus/SmartZone 100 (SZ-100) (EOL)v5
    Range: 0
  • Ruckus/SmartZone 144-Dataplane (SZ144-D)v5
    Range: 0
  • Ruckus/SmartZone 144 (SZ-144)v5
    Range: 0
  • Ruckus/SmartZone 300 (SZ300) (EOL)v5
    Range: 0
  • Ruckus Wireless/RUCKUS Access Pointv5
    Range: 0
  • Ruckus/ZoneDirector 1200 (EOL)v5
    Range: 0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.