Ruckus Wireless as an Unifi alternative?

Notice: Page may contain affiliate links for which we may earn a small commission through services like Amazon Affiliates or Skimlinks.

ms264556

Well-Known Member
Sep 13, 2021
486
432
63
New Zealand
ms264556.net
I've limited experience with Ruckus Unleashed, and no experience with other Commscope AP+Controller lines.

What has always puzzled me about Unleashed (unless i'm missing something) is inability to save (and load) configuration in text form, so that it can be modified and loaded back via CLI. I know i can keep text config and paste it, but eventually it would become stale (especially if some changes are made via GUI).

I assume that there is a commercial offering from Commscope which does not suffer this limitation?

The only other WiFi AP/controller environment i've detailed experience is Aruba, and it does indeed have fully modifiable text config (via GUI or CLI), even in InstantOn edition (though this i believe is not being split off).
The Unleashed/ZoneDirector configuration database is just a folder of xml files.

You can always decrypt a backup, edit the xml, re-encrypt, then restore.

To have a poke around, without needing to script anything, you can use the online tool on this page: Decrypt Ruckus Backups | ms264556.net

And there is a comprehensive AJAX API which can be leveraged from e.g. Python. I have a library which uses the AJAX endpoints or backups, but it only has functionality I've found useful so far. Definitely it could be modified to do what you're after: GitHub - ms264556/aioruckus: Python client for Ruckus Unleashed and Ruckus ZoneDirector
 
  • Like
Reactions: is39

jrk2025

New Member
Jul 14, 2025
6
0
1
You can see here that the Xi-1 is a ZF7321. It's honestly not worth your time to convert such a weak old AP.

The Xi-3 is an R500, which can run an early Unleashed version, so I have a conversion guide here.

You could, in theory, follow similar steps for the Xi-1, if someone had a ZF7321 and gave you the antenna info numbers. But I won't be bothering to work it out, sorry.
Thanks for your Reply, Ur right is a old device. But I am having 200 No Units Box packing with POE Adapter, cables everything. I don't want to wast the product. I an have 400 Customer runing IPTV which need 30 -50 Mbps throughput only(Currently runing on Optical fiber). I am planing to use this device and design campus wifi network.

What you think about this?
 

ms264556

Well-Known Member
Sep 13, 2021
486
432
63
New Zealand
ms264556.net
Thanks for your Reply, Ur right is a old device. But I am having 200 No Units Box packing with POE Adapter, cables everything. I don't want to wast the product. I an have 400 Customer runing IPTV which need 30 -50 Mbps throughput only(Currently runing on Optical fiber). I am planing to use this device and design campus wifi network.

What you think about this?
You'd need someone with a real ZF7321 so they could get the antinfo bsp setting (otherwise they won't have beamflex). Then I could guess at the conversion procedure.
The ZF7321 is either 5GHz or 2.4GHz, so I'd guess beamflex would be really helpful to make 5GHz-only range acceptable.

But your next problem would be controllers. These are far too old to run Unleashed so to run 400 APs you'd need to either run them standalone or buy 8 ZD1100 controllers, 3 ZD1200s or a ZD3000.
 

jrk2025

New Member
Jul 14, 2025
6
0
1
You'd need someone with a real ZF7321 so they could get the antinfo bsp setting (otherwise they won't have beamflex). Then I could guess at the conversion procedure.
The ZF7321 is either 5GHz or 2.4GHz, so I'd guess beamflex would be really helpful to make 5GHz-only range acceptable.

But your next problem would be controllers. These are far too old to run Unleashed so to run 400 APs you'd need to either run them standalone or buy 8 ZD1100 controllers, 3 ZD1200s or a ZD3000.
Thanks for Your Immediate response, I don't have ZF7321 with me. We need only 5Ghz with good coverage Range. If you need antinfo bsp setting from Xi-1 I Can try if you guide me. Managing the device standalone is not a problem for me or else we able to can convert this device as wifi Extender.
 

ms264556

Well-Known Member
Sep 13, 2021
486
432
63
New Zealand
ms264556.net
If you need antinfo bsp setting from Xi-1 I Can try if you guide me.
No, the Xi-1 will have beamflex disabled, so it's just operating as an omni. I'd need the antinfo number from a ZF7321 so the beamflex can be re-enabled on the Xi-1. Because if you're not enabling beamflex & you're running standalone firmware, then there's no point in doing the conversion.
 

sth

Active Member
Oct 29, 2015
411
102
43
Anyone got experience with outdoor APs here (T650, T670?) . What kind of useable range should I expect to see Tying to figure out how best to cover my outdoor area.
 

jrk2025

New Member
Jul 14, 2025
6
0
1
Like I said, above, you copy the antinfo number from a real 7321. You can see the basic procedure by reading my Xi-3 to R500 guide
Hi Can I try this,
 

ms264556

Well-Known Member
Sep 13, 2021
486
432
63
New Zealand
ms264556.net
Dear ms264556 kindly help me to reuse the device.
You need at least a ZF7321 boot log which includes the antinfo numbers.

Pointing at random openwrt pages isn't useful.

Just so you know, I don't work for anyone associated with Ruckus.

I provide all of the help and guides for free in my spare time. So it's not feasible for me to whip up a new guide for a product I don't already own.

(I've never received any money or help from Ruckus. In fact, I've destroyed several APs testing firmware mods; and Ruckus charged me several hundred dollars to buy a new R560 & Ruckus One subscription so that I could add Ruckus One support to Home Assistant).
 

j_h_o

Active Member
Apr 21, 2015
679
193
43
California, US
Does the 200.18 firmware work properly now? Almost a year ago I had tried a newer Unleashed, and found I couldn't connect to any wireless networks I would create on the AP (no clients could connect to WPA2-only, or WPA3-only SSID). If I do this on R750_200.18.7.1.323, is anyone aware of any problems with this firmware? (doing a fresh install)
 
Last edited:

hmw

Well-Known Member
Apr 29, 2019
661
281
63
Does the 200.18 firmware work properly now? Almost a year ago I had tried a newer Unleashed, and found I couldn't connect to any wireless networks I would create on the AP (no clients could connect to WPA2-only, or WPA3-only SSID). If I do this on R750_200.18.7.1.323, is anyone aware of any problems with this firmware? (doing a fresh install)
Just installed it. So far so good. Been using it on a mix of R750s and H550s with one SSID set to WPA3 and the others being WPA2/3 mixed. Seems to be working fine
 

j_h_o

Active Member
Apr 21, 2015
679
193
43
California, US
Just installed it. So far so good. Been using it on a mix of R750s and H550s with one SSID set to WPA3 and the others being WPA2/3 mixed. Seems to be working fine
I tried 200.18.7.1.323. The default WPA2/WPA3 SSID could not be connected to. Created a WPA3-only and WPA2-only and clients could not associate to either.

I wonder what the issue is/was... the logs do not appear to contain anything useful.
 

hmw

Well-Known Member
Apr 29, 2019
661
281
63
I tried 200.18.7.1.323. The default WPA2/WPA3 SSID could not be connected to. Created a WPA3-only and WPA2-only and clients could not associate to either.

I wonder what the issue is/was... the logs do not appear to contain anything useful.
What’s the client? Also what’s your country code / region?

Try restricting the radios
to one of the more common channels and see if that helps
 

j_h_o

Active Member
Apr 21, 2015
679
193
43
California, US
Tried a Pixel 9 and a MBP. Neither can connect to the SSID. The R750 is a US model. Connected to a UniFi switch, and I'm having to force it to 802.3at after Unleashed set up.

(To be clear: I have other APs upgraded to 200.18.7.1.323 fine. Perhaps the pattern is if it only has 802.3af during initial set up... I don't know.)
 
Last edited:

ms264556

Well-Known Member
Sep 13, 2021
486
432
63
New Zealand
ms264556.net
So I think there are 2 'bad guys' in this story.

Bad guys #1: Security Researchers (obviously).

In this case, it looks like Moshe made a couple of attempts to use a broken Hacker One web form, then convinced CERT/CC to do a hit-piece.
I know for a fact that these CVEs could have been escalated through support or sales, since I have successfully done so.
These security 'research' companies have an incentive to make the biggest splash possible, and there is absolutely no downside to making spurious claims.
If you read most PR from security research companies, their technical analyses are full of exaggerations and hyperbole. So it's unsurprising they were out to do the worst possible hatchet job with the non-techy stuff too. But shame on CERT/CC for being so credulous.

And then BleepingComputer publish an article THE NEXT DAY (which, like every other security news site, just repackaged the PR) headed "Ruckus Networks leaves severe flaws unpatched", claiming "BleepingComputer attempted to contact Ruckus via multiple communication channels, but we were unable to reach out".
I mean, the relevant Ruckus people probably found out about this issue after Bleeping Computer had already published. Even if time zones weren't a thing, expecting your initial contact with someone at Ruckus to result in an instant official response to this security ambush was unfair.

Tom Lawrence's video was sensationalist too, and not particularly accurate. There's super bad stuff to be exploited, but not most of the stuff he complains about. At least he's honest about "translating ...xxx.. into engaging content", rather than claiming to carefully research his topic.

Bad guys #2: Ruckus (obviously).

  1. Their software development process obviously lacks competent security gates. Maybe there are no security checks/KPIs at all?
  2. They make it difficult to report security issues.
  3. Once you do report a security issue, then you aren't allowed any direct contact with Ruckus, and you often get no credit at all. And they expect you to put up with this for $0, because that's their bug bounty.
  4. Ruckus silently roll out critical security fixes, but then they don't encourage you to upgrade regularly!

I understand (1): I know a couple of developers working on enterprise network equipment. The pay is low and the work is mostly drudgery, so the staff are either very junior or not particularly interested in keeping up-to-date with modern software practice. Every Ruckus security issue I've mentioned to them, they were "oh yeah, we'd have that issue too". Doesn't make it right though. This has been going on for so many years that I assume enterprise networking companies just figure occasional bad press is cheaper than hiring good quality software developers.

Every piece of enterprise network equipment I personally own is riddled with software vulnerabilities. A big part of the reason Ruckus are a popular target is that they give their software away freely: anyone can download firmware and pull it apart. And they support their hardware for a long time, so hackers can target even non-VM platforms for almost-free by visiting eBay.

The Ruckus firmware/software modus operandi is to build something once, then just piecemeal upgrade components when absolutely necessary. So it's common to find 10+ year old code hanging around in the latest product versions. Not great for security.
If you're going to be lazy like this then you MUST have a continuous process to scan for newly identified classes of vulnerability. Note I say classes. Ruckus are a little better now, but in the past I've seen them fix a reported security issue but leave an adjacent instance of the same issue on the same webpage unfixed. But still, when something is fixed in Unleashed today, nobody is visiting SmartZone and fixing the equivalent problem.

I complained on Reddit about the (broken) Ruckus security form actually going directly to Hacker One, bypassing Ruckus. An employee said "we're listening", but the embedded Hacker One form was still broken for me when I looked a couple of days ago.
I don't know if it's broken because Firefox, or because Firefox/Android, or because ad-blocking. But I also don't care: I just don't bother reporting vulnerabilities unless they're terrible.

It's annoying that e.g. their Ruckus One trial form requires you to disable ad-blocking otherwise it disappears. But it's unforgivable that their security reporting form is (i) 100% outsourced, and (ii) non-functional. Give me a security contact email!!!! Let the team behind this email submit the Hacker One form, keep me informed, and monitor progress to ensure they don't lose a huge issue between the cracks. Are you really getting so many security vulnerabilities reported that this is too much work????
 
Last edited:

mattlach

Active Member
Aug 1, 2014
410
173
43
So I think there are 2 'bad guys' in this story.

Bad guys #1: Security Researchers (obviously).

In this case, it looks like Moshe made a couple of attempts to use a broken Hacker One web form, then convinced CERT/CC to do a hit-piece.
I know for a fact that these CVEs could have been escalated through support or sales, since I have successfully done so.
These security 'research' companies have an incentive to make the biggest splash possible, and there is absolutely no downside to making spurious claims.
If you read most PR from security research companies, their technical analyses are full of exaggerations and hyperbole. So it's unsurprising they were out to do the worst possible hatchet job with the non-techy stuff too. But shame on CERT/CC for being so credulous.

And then BleepingComputer publish an article THE NEXT DAY (which, like every other security news site, just repackaged the PR) headed "Ruckus Networks leaves severe flaws unpatched", claiming "BleepingComputer attempted to contact Ruckus via multiple communication channels, but we were unable to reach out".
I mean, the relevant Ruckus people probably found out about this issue after Bleeping Computer had already published. Even if time zones weren't a thing, expecting your initial contact with someone at Ruckus to result in an instant official response to this security ambush was unfair.

Tom Lawrence's video was sensationalist too, and not particularly accurate. There's super bad stuff to be exploited, but not most of the stuff he complains about. At least he's honest about "translating ...xxx.. into engaging content", rather than claiming to carefully research his topic.

Bad guys #2: Ruckus (obviously).

  1. Their software development process obviously lacks competent security gates. Maybe there are no security checks/KPIs at all?
  2. They make it difficult to report security issues.
  3. Once you do report a security issue, then you aren't allowed any direct contact with Ruckus, and you often get no credit at all. And they expect you to put up with this for $0, because that's their bug bounty.
  4. Ruckus silently roll out critical security fixes, but then they don't encourage you to upgrade regularly!

I understand (1): I know a couple of developers working on enterprise network equipment. The pay is low and the work is mostly drudgery, so the staff are either very junior or not particularly interested in keeping up-to-date with modern software practice. Every Ruckus security issue I've mentioned to them, they were "oh yeah, we'd have that issue too". Doesn't make it right though. This has been going on for so many years that I assume enterprise networking companies just figure occasional bad press is cheaper than hiring good quality software developers.

Every piece of enterprise network equipment I personally own is riddled with software vulnerabilities. A big part of the reason Ruckus are a popular target is that they give their software away freely: anyone can download firmware and pull it apart. And they support their hardware for a long time, so hackers can target even non-VM platforms for almost-free by visiting eBay.

The Ruckus firmware/software modus operandi is to build something once, then just piecemeal upgrade components when absolutely necessary. So it's common to find 10+ year old code hanging around in the latest product versions. Not great for security.
If you're going to be lazy like this then you MUST have a continuous process to scan for newly identified classes of vulnerability. Note I say classes. Ruckus are a little better now, but in the past I've seen them fix a reported security issue but leave an adjacent instance of the same issue on the same webpage unfixed. But still, when something is fixed in Unleashed today, nobody is visiting SmartZone and fixing the equivalent problem.

I complained on Reddit about the (broken) Ruckus security form actually going directly to Hacker One, bypassing Ruckus. An employee said "we're listening", but the embedded Hacker One form was still broken for me when I looked a couple of days ago.
I don't know if it's broken because Firefox, or because Firefox/Android, or because ad-blocking. But I also don't care: I just don't bother reporting vulnerabilities unless they're terrible.

It's annoying that e.g. their Ruckus One trial form requires you to disable ad-blocking otherwise it disappears. But it's unforgivable that their security reporting form is (i) 100% outsourced, and (ii) non-functional. Give me a security contact email!!!! Let the team behind this email submit the Hacker One form, keep me informed, and monitor progress to ensure they don't lose a huge issue between the cracks. Are you really getting so many security vulnerabilities reported that this is too much work????
That is probably all correct,

But I guess what I am trying to assess is: How exposed are those of us using Unleashed at home right now?

Reading the article, most of it in there has to do with the enterprise management modules, not the Unleashed firmware setup, but I don't know if there is something I am missing.

In my case, (despite repeated nags) I never signed up for any tie-in to the Ruckus cloud management / password reset options, which is sounding like a better and better choice every day now considering their issues.

I also have management access restricted to a separate OOB local only management VLAN that isnt connected to the internet.

So I am thinking I am probably OK, but I don't know for sure.
 

mattlach

Active Member
Aug 1, 2014
410
173
43
Well, it looks like restricting management interface access to a separate VLAN may be useless.

There are still a ton of open ports on the Ruckus devices main IP addresses.

They don't allow web browser logins on the main IP, but that is of little comfort...

My expectation was that all ports visible from anything but the management network would be closed.


Here is the AP configured as the main unleashed master:

Code:
PORT      STATE    SERVICE
22/tcp    filtered ssh
23/tcp    filtered telnet
80/tcp    open     http
443/tcp   open     https
1883/tcp  open     mqtt
4222/tcp  open     vrml-multi-use
8099/tcp  open     unknown
9997/tcp  open     palace-6
9998/tcp  open     distinct32
9999/tcp  open     abyss
18301/tcp open     unknown
And here is the one that is not the master:
Code:
PORT      STATE SERVICE
22/tcp    open  ssh
443/tcp   open  https
1883/tcp  open  mqtt
8099/tcp  open  unknown
9999/tcp  open  abyss
18301/tcp open  unknown
The Master isn't accepting ssh connections on the main vlan, but the non-master is. or at least probably would, except I can't connect to it, because I have blacklisted the broken old ssh-rsa host key algorithm So not only is that port probably accessible on the interface I don't want it to be accessible on, but it is likely protected by severely outdated and broken encryption...

The thing is, I don't even know how I can firewall this off.

For it to work, the access points NEED to be accessible on the network. If I start blocking ports, shit will break.

This needs to be done internal to the device, and the fact that it isn't is highly problematic.


Looks like these access points have serious security issues, and our options are to just sit back and wait and hope that Ruckus patches them. :/
 
  • Like
Reactions: BoGs