Unrated severityNVD Advisory· Published Mar 26, 2026· Updated Mar 26, 2026
Ruckus AP CLI Arbitrary File Read Allows Authenticated Remote File Access
CVE-2021-4474
Description
Ruckus Access Point products contain an arbitrary file read vulnerability in the command-line interface that allows authenticated remote attackers with administrative privileges to read arbitrary files from the underlying filesystem. Attackers can exploit this vulnerability to access sensitive information including configuration files, credentials, and system data stored on the device.
Affected products
9- Ruckus/RUCKUS Unleashedv5Range: 0
- Ruckus/SmartZone 100-D (SZ100-D) (EOL)v5Range: 0
- Ruckus/SmartZone 100 (SZ-100) (EOL)v5Range: 0
- Ruckus/SmartZone 144-Dataplane (SZ144-D)v5Range: 0
- Ruckus/SmartZone 144 (SZ-144)v5Range: 0
- Ruckus/SmartZone 300 (SZ300) (EOL)v5Range: 0
- Ruckus Wireless/RUCKUS Access Pointv5Range: 0
- Ruckus/ZoneDirector 1200 (EOL)v5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- support.ruckuswireless.com/security_bulletins/306mitrevendor-advisory
- www.vulncheck.com/advisories/ruckus-ap-cli-arbitrary-file-read-allows-authenticated-remote-file-accessmitrethird-party-advisory
News mentions
0No linked articles in our index yet.