All the vulnerabilites related to LOGITEC CORPORATION - LAN-W300N/RS
cve-2021-20642
Vulnerability from cvelistv5
Published
2021-02-12 06:15
Modified
2024-08-03 17:45
Severity ?
EPSS score ?
Summary
Improper check or handling of exceptional conditions in LOGITEC LAN-W300N/RS allows a remote attacker to cause a denial-of-service (DoS) condition by sending a specially crafted URL.
References
▼ | URL | Tags |
---|---|---|
https://www.elecom.co.jp/news/security/20210126-01/ | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN96783542/index.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
LOGITEC CORPORATION | LAN-W300N/RS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:45:45.349Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20210126-01/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN96783542/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "LAN-W300N/RS", "vendor": "LOGITEC CORPORATION", "versions": [ { "status": "affected", "version": "LAN-W300N/RS" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper check or handling of exceptional conditions in LOGITEC LAN-W300N/RS allows a remote attacker to cause a denial-of-service (DoS) condition by sending a specially crafted URL." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper check or handling of exceptional conditions", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-12T06:15:45", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.elecom.co.jp/news/security/20210126-01/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN96783542/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20642", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LAN-W300N/RS", "version": { "version_data": [ { "version_value": "LAN-W300N/RS" } ] } } ] }, "vendor_name": "LOGITEC CORPORATION" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper check or handling of exceptional conditions in LOGITEC LAN-W300N/RS allows a remote attacker to cause a denial-of-service (DoS) condition by sending a specially crafted URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper check or handling of exceptional conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.elecom.co.jp/news/security/20210126-01/", "refsource": "MISC", "url": "https://www.elecom.co.jp/news/security/20210126-01/" }, { "name": "https://jvn.jp/en/jp/JVN96783542/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN96783542/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20642", "datePublished": "2021-02-12T06:15:45", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:45:45.349Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20641
Vulnerability from cvelistv5
Published
2021-02-12 06:15
Modified
2024-08-03 17:45
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in LOGITEC LAN-W300N/RS allows remote attackers to hijack the authentication of administrators via a specially crafted URL. As a result, unintended operations to the device such as changes of the device settings may be conducted.
References
▼ | URL | Tags |
---|---|---|
https://www.elecom.co.jp/news/security/20210126-01/ | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN96783542/index.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
LOGITEC CORPORATION | LAN-W300N/RS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:45:44.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20210126-01/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN96783542/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "LAN-W300N/RS", "vendor": "LOGITEC CORPORATION", "versions": [ { "status": "affected", "version": "LAN-W300N/RS" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in LOGITEC LAN-W300N/RS allows remote attackers to hijack the authentication of administrators via a specially crafted URL. As a result, unintended operations to the device such as changes of the device settings may be conducted." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site request forgery", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-12T06:15:45", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.elecom.co.jp/news/security/20210126-01/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN96783542/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20641", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LAN-W300N/RS", "version": { "version_data": [ { "version_value": "LAN-W300N/RS" } ] } } ] }, "vendor_name": "LOGITEC CORPORATION" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in LOGITEC LAN-W300N/RS allows remote attackers to hijack the authentication of administrators via a specially crafted URL. As a result, unintended operations to the device such as changes of the device settings may be conducted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site request forgery" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.elecom.co.jp/news/security/20210126-01/", "refsource": "MISC", "url": "https://www.elecom.co.jp/news/security/20210126-01/" }, { "name": "https://jvn.jp/en/jp/JVN96783542/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN96783542/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20641", "datePublished": "2021-02-12T06:15:45", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:45:44.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32626
Vulnerability from cvelistv5
Published
2023-08-18 09:36
Modified
2024-10-08 15:05
Severity ?
EPSS score ?
Summary
Hidden functionality vulnerability in LAN-W300N/RS all versions, and LAN-W300N/PR5 all versions allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
LOGITEC CORPORATION | LAN-W300N/RS | |
LOGITEC CORPORATION | LAN-W300N/PR5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.344Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20230810-01/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU91630351/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:logitec:lan-w300n\\/rs:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "lan-w300n\\/rs", "vendor": "logitec", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:logitec:lan_w300n_pr5:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "lan_w300n_pr5", "vendor": "logitec", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-32626", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T15:01:06.385485Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T15:05:09.195Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "LAN-W300N/RS", "vendor": "LOGITEC CORPORATION", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LAN-W300N/PR5", "vendor": "LOGITEC CORPORATION", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Hidden functionality vulnerability in LAN-W300N/RS all versions, and LAN-W300N/PR5 all versions allows an unauthenticated attacker to log in to the product\u0027s certain management console and execute arbitrary OS commands." } ], "problemTypes": [ { "descriptions": [ { "description": "Hidden Functionality", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-18T09:36:26.714Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20230810-01/" }, { "url": "https://jvn.jp/en/vu/JVNVU91630351/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-32626", "datePublished": "2023-08-18T09:36:26.714Z", "dateReserved": "2023-08-09T11:54:54.055Z", "dateUpdated": "2024-10-08T15:05:09.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }