All the vulnerabilites related to ELECOM CO.,LTD. - WRC-X1500GS-B
jvndb-2024-001061
Vulnerability from jvndb
Published
2024-01-24 17:16
Modified
2024-08-28 17:12
Severity ?
Summary
ELECOM wireless LAN routers vulnerable to OS command injection
Details
Multiple ELECOM wireless LAN routers provided by ELECOM CO.,LTD. contain an OS command injection vulnerability.
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/vu/JVNVU90908488/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-22372 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2024-22372 | |
OS Command Injection(CWE-78) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001061.html", "dc:date": "2024-08-28T17:12+09:00", "dcterms:issued": "2024-01-24T17:16+09:00", "dcterms:modified": "2024-08-28T17:12+09:00", "description": "Multiple ELECOM wireless LAN routers provided by ELECOM CO.,LTD. contain an OS command injection vulnerability.\r\n\r\nChuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.\r\nJPCERT/CC coordinated with the developer.", "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001061.html", "sec:cpe": [ { "#text": "cpe:/o:elecom:wrc-x1500GS-B", "@product": "WRC-X1500GS-B", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x1500GSA-B", "@product": "WRC-X1500GSA-B", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x1800gs-b_firmware", "@product": "WRC-X1800GS-B", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x1800gsa-b_firmware", "@product": "WRC-X1800GSA-B", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x1800gsh-b_firmware", "@product": "WRC-X1800GSH-B", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x3000gs2-b_firmware", "@product": "WRC-X3000GS2-B firmware", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x3000gs2-w_firmware", "@product": "WRC-X3000GS2-W firmware", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x3000gs2a-b_firmware", "@product": "WRC-X3000GS2A-B firmware", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x6000xs-g_firmware", "@product": "WRC-X6000XS-G", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x6000xst-g_firmware", "@product": "WRC-X6000XST-G", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" } ], "sec:cvss": [ { "@score": "5.2", "@severity": "Medium", "@type": "Base", "@vector": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "@version": "2.0" }, { "@score": "6.8", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" } ], "sec:identifier": "JVNDB-2024-001061", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU90908488/index.html", "@id": "JVNVU#90908488", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-22372", "@id": "CVE-2024-22372", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2024-22372", "@id": "CVE-2024-22372", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-78", "@title": "OS Command Injection(CWE-78)" } ], "title": "ELECOM wireless LAN routers vulnerable to OS command injection" }
jvndb-2024-000078
Vulnerability from jvndb
Published
2024-07-30 15:34
Modified
2024-09-24 17:04
Severity ?
Summary
Multiple vulnerabilities in ELECOM wireless LAN routers
Details
Multiple wireless LAN routers provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below.
Unrestricted Upload of File with Dangerous Type (CWE-434)
CVE-2024-34021
OS Command Injection (CWE-78)
CVE-2024-39607
Cross-Site Request Forgery (CWE-352)
CVE-2024-40883
CVE-2024-34021
Toyama Taku, and Daichi Arai of NEC Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-39607, CVE-2024-40883
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN06672778/ | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-34021 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-39607 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-40883 | |
Cross-Site Request Forgery(CWE-352) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html | |
OS Command Injection(CWE-78) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html | |
No Mapping(CWE-Other) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000078.html", "dc:date": "2024-09-24T17:04+09:00", "dcterms:issued": "2024-07-30T15:34+09:00", "dcterms:modified": "2024-09-24T17:04+09:00", "description": "Multiple wireless LAN routers provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below.\r\n\r\nUnrestricted Upload of File with Dangerous Type (CWE-434)\r\nCVE-2024-34021\r\nOS Command Injection (CWE-78)\r\nCVE-2024-39607\r\nCross-Site Request Forgery (CWE-352)\r\nCVE-2024-40883\r\n\r\nCVE-2024-34021\r\nToyama Taku, and Daichi Arai of NEC Corporation reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.\r\n\r\nCVE-2024-39607, CVE-2024-40883\r\nKentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000078.html", "sec:cpe": [ { "#text": "cpe:/o:elecom:wrc-2533gs2-b_firmware", "@product": "WRC-2533GS2-B", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-2533gs2-w_firmware", "@product": "WRC-2533GS2-W", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-2533gs2v-b_firmware", "@product": "WRC-2533GS2V-B", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x1500GS-B", "@product": "WRC-X1500GS-B", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x1500GSA-B", "@product": "WRC-X1500GSA-B", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x3000gs2-b_firmware", "@product": "WRC-X3000GS2-B firmware", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x3000gs2-w_firmware", "@product": "WRC-X3000GS2-W firmware", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x3000gs2a-b_firmware", "@product": "WRC-X3000GS2A-B firmware", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x6000xs-g_firmware", "@product": "WRC-X6000XS-G", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:elecom:wrc-x6000xst-g_firmware", "@product": "WRC-X6000XST-G", "@vendor": "ELECOM CO.,LTD.", "@version": "2.2" } ], "sec:cvss": { "@score": "6.8", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2024-000078", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN06672778/", "@id": "JVN#06672778", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-34021", "@id": "CVE-2024-34021", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-39607", "@id": "CVE-2024-39607", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-40883", "@id": "CVE-2024-40883", "@source": "CVE" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-352", "@title": "Cross-Site Request Forgery(CWE-352)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-78", "@title": "OS Command Injection(CWE-78)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "Multiple vulnerabilities in ELECOM wireless LAN routers" }
cve-2024-22372
Vulnerability from cvelistv5
Published
2024-01-24 04:38
Modified
2024-09-09 06:37
Severity ?
EPSS score ?
Summary
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.541Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20240123-01/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU90908488/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WRC-X1800GS-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.17 and earlier" } ] }, { "product": "WRC-X1800GSA-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.17 and earlier" } ] }, { "product": "WRC-X1800GSH-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.17 and earlier" } ] }, { "product": "WRC-X6000XS-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.09" } ] }, { "product": "WRC-X6000XST-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.12 and earlier" } ] }, { "product": "WRC-X1500GS-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X1500GSA-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X3000GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2A-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product." } ], "problemTypes": [ { "descriptions": [ { "description": "OS command injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T06:37:44.578Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20240123-01/" }, { "url": "https://jvn.jp/en/vu/JVNVU90908488/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-22372", "datePublished": "2024-01-24T04:38:20.199Z", "dateReserved": "2024-01-10T00:47:14.234Z", "dateUpdated": "2024-09-09T06:37:44.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39607
Vulnerability from cvelistv5
Published
2024-08-01 01:17
Modified
2024-09-26 04:08
Severity ?
EPSS score ?
Summary
OS command injection vulnerability exists in ELECOM wireless LAN routers. A specially crafted request may be sent to the affected product by a logged-in user with an administrative privilege to execute an arbitrary OS command.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:elecom:wrc-x6000xs-g_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wrc-x6000xs-g_firmware", "vendor": "elecom", "versions": [ { "lessThanOrEqual": "1.11", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:elecom:wrc-x1500gs-b_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wrc-x1500gs-b_firmware", "vendor": "elecom", "versions": [ { "lessThanOrEqual": "1.11", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:elecom:wrc-x1500gsa-b_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wrc-x1500gsa-b_firmware", "vendor": "elecom", "versions": [ { "lessThanOrEqual": "1.11", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-39607", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T14:25:37.958754Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-01T14:32:12.932Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WRC-X6000XS-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X1500GS-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X1500GSA-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X3000GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2A-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X6000XST-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.14 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability exists in ELECOM wireless LAN routers. A specially crafted request may be sent to the affected product by a logged-in user with an administrative privilege to execute an arbitrary OS command." } ], "problemTypes": [ { "descriptions": [ { "description": "OS command injection", "lang": "en-US", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T04:08:30.103Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20240730-01/" }, { "url": "https://jvn.jp/en/jp/JVN06672778/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-39607", "datePublished": "2024-08-01T01:17:00.982Z", "dateReserved": "2024-07-26T08:52:15.655Z", "dateUpdated": "2024-09-26T04:08:30.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-40883
Vulnerability from cvelistv5
Published
2024-08-01 01:18
Modified
2024-10-27 01:09
Severity ?
EPSS score ?
Summary
Cross-site request forgery vulnerability exists in ELECOM wireless LAN routers. Viewing a malicious page while logging in to the affected product with an administrative privilege, the user may be directed to perform unintended operations such as changing the login ID, login password, etc.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-40883", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T14:24:58.175059Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-27T01:09:06.684Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WRC-X6000XS-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X1500GS-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X1500GSA-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X3000GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2A-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X6000XST-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.14 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery vulnerability exists in ELECOM wireless LAN routers. Viewing a malicious page while logging in to the affected product with an administrative privilege, the user may be directed to perform unintended operations such as changing the login ID, login password, etc." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "Cross-site request forgery (CSRF)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T04:09:19.532Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20240730-01/" }, { "url": "https://jvn.jp/en/jp/JVN06672778/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-40883", "datePublished": "2024-08-01T01:18:01.801Z", "dateReserved": "2024-07-26T08:52:14.749Z", "dateUpdated": "2024-10-27T01:09:06.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }