A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
History

Fri, 22 Aug 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Commscope
Commscope ruckus Smartzone
CPEs cpe:2.3:h:ruckuswireless:smartzone:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone:-:*:*:*:*:*:*:*
Vendors & Products Ruckuswireless smartzone
Commscope
Commscope ruckus Smartzone

Wed, 28 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published: 2023-12-07T06:22:32.328Z

Updated: 2025-05-28T13:58:41.326Z

Reserved: 2023-11-24T00:19:52.591Z

Link: CVE-2023-49225

cve-icon Vulnrichment

Updated: 2024-08-02T21:53:45.350Z

cve-icon NVD

Status : Modified

Published: 2023-12-07T07:15:12.880

Modified: 2025-08-22T21:09:15.577

Link: CVE-2023-49225

cve-icon Redhat

No data.