<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2023-7338 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2023-7338/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 20:16:08 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2023-7338/feed.xml" rel="self" type="application/rss+xml"/><item><title>Ruckus Unleashed Authenticated Remote Code Execution via CVE-2023-7338</title><link>https://feed.craftedsignal.io/briefs/2026-03-ruckus-rce/</link><pubDate>Thu, 26 Mar 2026 20:16:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-ruckus-rce/</guid><description>CVE-2023-7338 is a remote code execution vulnerability affecting Ruckus Unleashed when gateway mode is enabled, allowing authenticated remote attackers to execute arbitrary code by sending specially crafted requests through the web-based management interface.</description><content:encoded>&lt;p>CVE-2023-7338 is a critical remote code execution (RCE) vulnerability found in Ruckus Unleashed, a Wi-Fi network management solution. The vulnerability resides within the web-based management interface and requires the affected system to be operating in gateway mode. An authenticated attacker can exploit this flaw by crafting and sending malicious requests to the management interface, resulting in arbitrary code execution on the device. This vulnerability was reported by VulnCheck and assigned…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2023-7338</category><category>ruckus</category><category>rce</category><category>os command injection</category></item></channel></rss>