Ruckus R710

  • Ruckus R710
    Ruckus R710
End of Life

Product Detail

The ZoneFlex R710 is industry’s highest performance 802.11ac Wave 2 access point.  It combines Ruckus patented technologies and best-in-class design with the next generation of 802.11ac features to deliver outstanding Wi-Fi performance and reliability.

With throughput capacities of 800 Mbps (2.4GHz) and 1733 Mbps (5GHz), the ZoneFlex R710 supports the highest available throughput for Wi-Fi clients. 802.11ac Multi-User MIMO (MU-MIMO) support allows the R710 to simultaneously transmit tomultiple client devices, drastically improving airtime efficiency, overall throughput, and availability. 

ZoneFlex R710 is purpose-built for high-capacity, high performance and interference-laden environments such as schools, universities, public venues, hotels, and conference centers.

Model Name:
R710
Product Family:
EOL RUCKUS Products
Recommended Software:
Stability Release:
Patches:
SmartZone AP Refresh Patch 5.2.2 (LT-GD MR 2)
Technology Release:
Patches:
SmartZone AP Patch 6.1.2.0.1003 (LT-GD-AP Patch-1003)

Documents

Downloads

KB Articles

Forum Topics

Security Bulletins

ID Title Version Release Date Edit Date
20210129 AP / ZD CLI Passphrase Vulnerability 1.0 January 29, 2021 January 29, 2021
20210511 RUCKUS AP Aggregation And Fragmentation Attacks Vulnerability (aka “FragAttacks”) 1.1 May 11, 2021 October 15, 2021
20230208 CVE-2023-25717: RUCKUS AP Web Vulnerability (RCE/CSRF) 1.2 February 08, 2023 May 18, 2023
20230404 CVE-2022-47522: Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues 1.0 April 04, 2023 April 05, 2023
20230731 RUCKUS Unleashed Authenticated Remote Command Execution Vulnerability 1.1 July 31, 2023 August 01, 2023
20231128 CVE-2023-49225: RUCKUS AP Stored Cross-Site Scripting Vulnerability 1.0 November 29, 2023 November 29, 2023
20240925 RUCKUS AP Remote Code Execution Vulnerability 1.2 October 04, 2024 October 11, 2024

Support Bulletins

Advanced Search

Working...Please wait

This is here to prevent you from accidentally submitting twice.

The page will automatically refresh.

Alert!!

Close