Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway mode is enabled. Attackers can exploit this vulnerability by sending specially crafted requests through the management interface to achieve arbitrary code execution on affected systems.

Project Subscriptions

Vendors Products
Ruckusnetworks Subscribe
Ruckus C110 Subscribe
Ruckus E510 Subscribe
Ruckus H320 Subscribe
Ruckus H350 Subscribe
Ruckus H510 Subscribe
Ruckus H550 Subscribe
Ruckus M510-jp Subscribe
Ruckus R320 Subscribe
Ruckus R350 Subscribe
Ruckus R510 Subscribe
Ruckus R550 Subscribe
Ruckus R610 Subscribe
Ruckus R650 Subscribe
Ruckus R710 Subscribe
Ruckus R720 Subscribe
Ruckus R750 Subscribe
Ruckus R850 Subscribe
Ruckus T310c Subscribe
Ruckus T310d Subscribe
Ruckus T310n Subscribe
Ruckus T310s Subscribe
Ruckus T350c Subscribe
Ruckus T350d Subscribe
Ruckus T350se Subscribe
Ruckus T610 Subscribe
Ruckus T710 Subscribe
Ruckus T710s Subscribe
Ruckus T750 Subscribe
Ruckus T750se Subscribe
Ruckus Unleashed Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Ruckusnetworks
Ruckusnetworks ruckus C110
Ruckusnetworks ruckus E510
Ruckusnetworks ruckus H320
Ruckusnetworks ruckus H350
Ruckusnetworks ruckus H510
Ruckusnetworks ruckus H550
Ruckusnetworks ruckus M510-jp
Ruckusnetworks ruckus R320
Ruckusnetworks ruckus R350
Ruckusnetworks ruckus R510
Ruckusnetworks ruckus R550
Ruckusnetworks ruckus R610
Ruckusnetworks ruckus R650
Ruckusnetworks ruckus R710
Ruckusnetworks ruckus R720
Ruckusnetworks ruckus R750
Ruckusnetworks ruckus R850
Ruckusnetworks ruckus T310c
Ruckusnetworks ruckus T310d
Ruckusnetworks ruckus T310n
Ruckusnetworks ruckus T310s
Ruckusnetworks ruckus T350c
Ruckusnetworks ruckus T350d
Ruckusnetworks ruckus T350se
Ruckusnetworks ruckus T610
Ruckusnetworks ruckus T710
Ruckusnetworks ruckus T710s
Ruckusnetworks ruckus T750
Ruckusnetworks ruckus T750se
Ruckusnetworks ruckus Unleashed
Vendors & Products Ruckusnetworks
Ruckusnetworks ruckus C110
Ruckusnetworks ruckus E510
Ruckusnetworks ruckus H320
Ruckusnetworks ruckus H350
Ruckusnetworks ruckus H510
Ruckusnetworks ruckus H550
Ruckusnetworks ruckus M510-jp
Ruckusnetworks ruckus R320
Ruckusnetworks ruckus R350
Ruckusnetworks ruckus R510
Ruckusnetworks ruckus R550
Ruckusnetworks ruckus R610
Ruckusnetworks ruckus R650
Ruckusnetworks ruckus R710
Ruckusnetworks ruckus R720
Ruckusnetworks ruckus R750
Ruckusnetworks ruckus R850
Ruckusnetworks ruckus T310c
Ruckusnetworks ruckus T310d
Ruckusnetworks ruckus T310n
Ruckusnetworks ruckus T310s
Ruckusnetworks ruckus T350c
Ruckusnetworks ruckus T350d
Ruckusnetworks ruckus T350se
Ruckusnetworks ruckus T610
Ruckusnetworks ruckus T710
Ruckusnetworks ruckus T710s
Ruckusnetworks ruckus T750
Ruckusnetworks ruckus T750se
Ruckusnetworks ruckus Unleashed

Thu, 26 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway mode is enabled. Attackers can exploit this vulnerability by sending specially crafted requests through the management interface to achieve arbitrary code execution on affected systems.
Title Ruckus Unleashed Authenticated RCE in Gateway Mode
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-27T21:55:37.051Z

Reserved: 2026-03-23T16:18:41.704Z

Link: CVE-2023-7338

cve-icon Vulnrichment

Updated: 2026-03-27T21:55:32.806Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T20:16:08.853

Modified: 2026-03-30T13:26:50.827

Link: CVE-2023-7338

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:25:32Z

Weaknesses