3 Critical RCE Vulnerability That Affects Ruckus Wireless Routers Let Hackers Exploit the Routers Remotely

A security researcher discovered a 3 critical remote code execution vulnerabilities in Ruckus Wireless routers let malicious hackers bypass the routers and take control of it remotely.

Ruckus Networks are known as selling wired and wireless networking equipment and software.

The vulnerabilities are discovered in the web-based interface allow attackers to exploit the router without a password and take complete control over the internet.

The exploitation used by various vulnerabilities such as information leak, authentication bypass, command injection, path traversal, stack overflow, and arbitrary file read/write.

The vulnerability allows gaining the root access on the Routers, but it is very difficult to exploit since the exploitation coordinating with 3 different severe vulnerabilities.

During the research, researchers examined the 33 different access points firmware and concluded that all of them were vulnerable to remote code execution vulnerability.

By taking control of the vulnerable router, attackers can monitor the unencrypted traffic on the enterprise network and redirect the user to a malicious website where they can drop the malware and also steal sensitive information such as user name and password using phishing attacks.

Gal Zror, a researcher who finds the vulnerabilities demonstrates the 3 remote code executions in Ruckus Wireless Routers, and the techniques used to find and exploit them in the annual Chaos Communication Congress conference.

According to finding report, The Demonstrations includes the following:

  • It overviews Ruckus Wireless Routers equipment and their attack surfaces. Explain the firmware analysis and emulation prosses using our dockerized QEMU full system framework.
  • -Demonstrate the first RCE and its specifics. Describe the webserver logic using the Ghidra decompiler and its scripting environment.
  • -Demonstrate the second RCE using stack overflow vulnerability.
  • -Lastly, demonstrate the third RCE by using a vulnerability chaining technique.
  • All Tools used in this research will be published.

According to Ruckus spokesperson Aharon Etengoff “By design, our devices do not fetch and install software automatically to ensure our customers can manage their networks appropriately,”

Released fixed the bugs and released a new  200.7.10.202.92 software update and highly recommend their customers to update their router and apply the patch.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Multiple Flaws With Android & Google Pixel Devices Let Attackers Elevate Privileges

Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions of…

5 minutes ago

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

16 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

16 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

19 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

22 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

23 hours ago