{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/ruckus/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["critical"],"_cs_tags":["CVE-2023-7338","ruckus","rce","os command injection"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eCVE-2023-7338 is a critical remote code execution (RCE) vulnerability found in Ruckus Unleashed, a Wi-Fi network management solution. The vulnerability resides within the web-based management interface and requires the affected system to be operating in gateway mode. An authenticated attacker can exploit this flaw by crafting and sending malicious requests to the management interface, resulting in arbitrary code execution on the device. This vulnerability was reported by VulnCheck and assigned…\u003c/p\u003e\n","date_modified":"2026-03-26T20:16:08Z","date_published":"2026-03-26T20:16:08Z","id":"/briefs/2026-03-ruckus-rce/","summary":"CVE-2023-7338 is a remote code execution vulnerability affecting Ruckus Unleashed when gateway mode is enabled, allowing authenticated remote attackers to execute arbitrary code by sending specially crafted requests through the web-based management interface.","title":"Ruckus Unleashed Authenticated Remote Code Execution via CVE-2023-7338","url":"https://feed.craftedsignal.io/briefs/2026-03-ruckus-rce/"}],"language":"en","title":"CraftedSignal Threat Feed — Ruckus","version":"https://jsonfeed.org/version/1.1"}