CVE-2019-19834: Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jail
highvulnerability
security
Summary
A directory traversal vulnerability (a type of attack where an attacker uses special path characters like '../' to access files outside the intended directory) in Ruckus Wireless Unleashed version 200.7.10.102.64 and earlier allows a remote attacker to escape the CLI (command-line interface, a text-based way to control software) by using '../../../bin/sh' as a parameter in the debug script execution function. This gives the attacker unauthorized access to the underlying system.
Vulnerability Details
CVSS Score
7.2(high)
EPSS (30-day exploit probability)
EPSS: 1.3%
Classification
Attack SophisticationTrivial
Original source: https://nvd.nist.gov/vuln/detail/CVE-2019-19834
First tracked: February 15, 2026 at 08:52 PM
Classified by LLM (prompt v3) · confidence: 95%