Description

Ruckus Access Point products contain an arbitrary file read vulnerability in the command-line interface that allows authenticated remote attackers with administrative privileges to read arbitrary files from the underlying filesystem. Attackers can exploit this vulnerability to access sensitive information including configuration files, credentials, and system data stored on the device.

INFO

Published Date :

2026-03-26T19:28:25.096Z

Last Modified :

2026-03-26T19:57:52.098Z

Source :

VulnCheck
AFFECTED PRODUCTS

The following products are affected by CVE-2021-4474 vulnerability.

Vendors Products
Ruckus
  • Ruckus Unleashed
  • Smartzone 100-d (sz100-d) (eol)
  • Smartzone 100 (sz-100) (eol)
  • Smartzone 144-dataplane (sz144-d)
  • Smartzone 144 (sz-144)
  • Smartzone 300 (sz300) (eol)
  • Zonedirector 1200 (eol)
Ruckuswireless
  • Ruckus Access Point
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2021-4474.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact