All the vulnerabilites related to ELECOM CO.,LTD. - WRC-X3000GS2-W
cve-2023-43752
Vulnerability from cvelistv5
Published
2023-11-16 06:46
Modified
2024-08-02 19:52
Severity ?
EPSS score ?
Summary
OS command injection vulnerability in WRC-X3000GS2-W v1.05 and earlier, WRC-X3000GS2-B v1.05 and earlier, and WRC-X3000GS2A-B v1.05 and earlier allows a network-adjacent authenticated user to execute an arbitrary OS command by sending a specially crafted request.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:52:11.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20231114-01/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU94119876/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WRC-X3000GS2-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.05 and earlier" } ] }, { "product": "WRC-X3000GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.05 and earlier" } ] }, { "product": "WRC-X3000GS2A-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.05 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability in WRC-X3000GS2-W v1.05 and earlier, WRC-X3000GS2-B v1.05 and earlier, and WRC-X3000GS2A-B v1.05 and earlier allows a network-adjacent authenticated user to execute an arbitrary OS command by sending a specially crafted request." } ], "problemTypes": [ { "descriptions": [ { "description": "OS command injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-16T06:46:38.102Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20231114-01/" }, { "url": "https://jvn.jp/en/vu/JVNVU94119876/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-43752", "datePublished": "2023-11-16T06:46:38.102Z", "dateReserved": "2023-10-31T07:10:42.739Z", "dateUpdated": "2024-08-02T19:52:11.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-40883
Vulnerability from cvelistv5
Published
2024-08-01 01:18
Modified
2024-10-27 01:09
Severity ?
EPSS score ?
Summary
Cross-site request forgery vulnerability exists in ELECOM wireless LAN routers. Viewing a malicious page while logging in to the affected product with an administrative privilege, the user may be directed to perform unintended operations such as changing the login ID, login password, etc.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-40883", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T14:24:58.175059Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-27T01:09:06.684Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WRC-X6000XS-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X1500GS-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X1500GSA-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X3000GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2A-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X6000XST-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.14 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery vulnerability exists in ELECOM wireless LAN routers. Viewing a malicious page while logging in to the affected product with an administrative privilege, the user may be directed to perform unintended operations such as changing the login ID, login password, etc." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "Cross-site request forgery (CSRF)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T04:09:19.532Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20240730-01/" }, { "url": "https://jvn.jp/en/jp/JVN06672778/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-40883", "datePublished": "2024-08-01T01:18:01.801Z", "dateReserved": "2024-07-26T08:52:14.749Z", "dateUpdated": "2024-10-27T01:09:06.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-34577
Vulnerability from cvelistv5
Published
2024-08-30 06:29
Modified
2024-08-30 14:24
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability exists in WRC-X3000GS2-B, WRC-X3000GS2-W, and WRC-X3000GS2A-B due to improper processing of input values in easysetup.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-34577", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-30T14:24:29.112981Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-30T14:24:50.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WRC-X3000GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2A-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in WRC-X3000GS2-B, WRC-X3000GS2-W, and WRC-X3000GS2A-B due to improper processing of input values in easysetup.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user\u0027s web browser." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-30T06:29:32.671Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20240827-01/" }, { "url": "https://jvn.jp/en/jp/JVN24885537/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-34577", "datePublished": "2024-08-30T06:29:32.671Z", "dateReserved": "2024-08-16T04:42:10.924Z", "dateUpdated": "2024-08-30T14:24:50.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22372
Vulnerability from cvelistv5
Published
2024-01-24 04:38
Modified
2024-09-09 06:37
Severity ?
EPSS score ?
Summary
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.541Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20240123-01/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU90908488/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WRC-X1800GS-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.17 and earlier" } ] }, { "product": "WRC-X1800GSA-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.17 and earlier" } ] }, { "product": "WRC-X1800GSH-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.17 and earlier" } ] }, { "product": "WRC-X6000XS-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.09" } ] }, { "product": "WRC-X6000XST-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.12 and earlier" } ] }, { "product": "WRC-X1500GS-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X1500GSA-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X3000GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2A-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product." } ], "problemTypes": [ { "descriptions": [ { "description": "OS command injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T06:37:44.578Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20240123-01/" }, { "url": "https://jvn.jp/en/vu/JVNVU90908488/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-22372", "datePublished": "2024-01-24T04:38:20.199Z", "dateReserved": "2024-01-10T00:47:14.234Z", "dateUpdated": "2024-09-09T06:37:44.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39607
Vulnerability from cvelistv5
Published
2024-08-01 01:17
Modified
2024-09-26 04:08
Severity ?
EPSS score ?
Summary
OS command injection vulnerability exists in ELECOM wireless LAN routers. A specially crafted request may be sent to the affected product by a logged-in user with an administrative privilege to execute an arbitrary OS command.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:elecom:wrc-x6000xs-g_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wrc-x6000xs-g_firmware", "vendor": "elecom", "versions": [ { "lessThanOrEqual": "1.11", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:elecom:wrc-x1500gs-b_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wrc-x1500gs-b_firmware", "vendor": "elecom", "versions": [ { "lessThanOrEqual": "1.11", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:elecom:wrc-x1500gsa-b_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wrc-x1500gsa-b_firmware", "vendor": "elecom", "versions": [ { "lessThanOrEqual": "1.11", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-39607", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T14:25:37.958754Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-01T14:32:12.932Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WRC-X6000XS-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X1500GS-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X1500GSA-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X3000GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2A-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X6000XST-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.14 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability exists in ELECOM wireless LAN routers. A specially crafted request may be sent to the affected product by a logged-in user with an administrative privilege to execute an arbitrary OS command." } ], "problemTypes": [ { "descriptions": [ { "description": "OS command injection", "lang": "en-US", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T04:08:30.103Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20240730-01/" }, { "url": "https://jvn.jp/en/jp/JVN06672778/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-39607", "datePublished": "2024-08-01T01:17:00.982Z", "dateReserved": "2024-07-26T08:52:15.655Z", "dateUpdated": "2024-09-26T04:08:30.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }