Search criteria

6 vulnerabilities by Yamaha Corporation

CVE-2024-22366 (GCVE-0-2024-22366)

Vulnerability from cvelistv5 – Published: 2024-01-24 04:35 – Updated: 2025-06-20 19:27
VLAI?
Summary
Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.
CWE
  • Active debug code
Assigner
Impacted products
Vendor Product Version
Yamaha Corporation WLX222 Affected: firmware Rev.24.00.03 and earlier
Create a notification for this product.
    Yamaha Corporation WLX413 Affected: firmware Rev.22.00.05 and earlier
Create a notification for this product.
    Yamaha Corporation WLX212 Affected: firmware Rev.21.00.12 and earlier
Create a notification for this product.
    Yamaha Corporation WLX313 Affected: firmware Rev.18.00.12 and earlier
Create a notification for this product.
    Yamaha Corporation WLX202 Affected: firmware Rev.16.00.18 and earlier
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T22:43:34.585Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU99896362/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.8,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-22366",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-24T16:37:23.887340Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-78",
                "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-20T19:27:11.652Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "WLX222",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.24.00.03 and earlier"
            }
          ]
        },
        {
          "product": "WLX413",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.22.00.05 and earlier"
            }
          ]
        },
        {
          "product": "WLX212",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.21.00.12 and earlier"
            }
          ]
        },
        {
          "product": "WLX313",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.18.00.12 and earlier"
            }
          ]
        },
        {
          "product": "WLX202",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.16.00.18 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device\u0027s management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Active debug code",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-24T04:35:55.337Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU99896362/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2024-22366",
    "datePublished": "2024-01-24T04:35:55.337Z",
    "dateReserved": "2024-01-09T07:04:26.494Z",
    "dateUpdated": "2025-06-20T19:27:11.652Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-20844 (GCVE-0-2021-20844)

Vulnerability from cvelistv5 – Published: 2021-11-24 08:25 – Updated: 2024-08-03 17:53
VLAI?
Summary
Improper neutralization of HTTP request headers for scripting syntax vulnerability in the Web GUI of RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, and RTX1210 Rev.14.01.38 and earlier allows a remote authenticated attacker to obtain sensitive information via a specially crafted web page.
Severity ?
No CVSS data available.
CWE
  • Improper Neutralization of HTTP Headers for Scripting Syntax
Assigner
Impacted products
Vendor Product Version
Yamaha Corporation RTX830, NVR510, NVR700W, RTX1210 Affected: RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, RTX1210 Rev.14.01.38 and earlier
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:53:22.863Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ntt-west.co.jp/smb/kiki_info/info/211109.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://business.ntt-east.co.jp/topics/2021/11_09.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU91161784.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU91161784/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "RTX830, NVR510, NVR700W, RTX1210",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, RTX1210 Rev.14.01.38 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper neutralization of HTTP request headers for scripting syntax vulnerability in the Web GUI of RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, and RTX1210 Rev.14.01.38 and earlier allows a remote authenticated attacker to obtain sensitive information via a specially crafted web page."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Improper Neutralization of HTTP Headers for Scripting Syntax",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-24T08:25:45",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ntt-west.co.jp/smb/kiki_info/info/211109.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://business.ntt-east.co.jp/topics/2021/11_09.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU91161784.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/vu/JVNVU91161784/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2021-20844",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "RTX830, NVR510, NVR700W, RTX1210",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, RTX1210 Rev.14.01.38 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Yamaha Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper neutralization of HTTP request headers for scripting syntax vulnerability in the Web GUI of RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, and RTX1210 Rev.14.01.38 and earlier allows a remote authenticated attacker to obtain sensitive information via a specially crafted web page."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Improper Neutralization of HTTP Headers for Scripting Syntax"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ntt-west.co.jp/smb/kiki_info/info/211109.html",
              "refsource": "MISC",
              "url": "https://www.ntt-west.co.jp/smb/kiki_info/info/211109.html"
            },
            {
              "name": "https://business.ntt-east.co.jp/topics/2021/11_09.html",
              "refsource": "MISC",
              "url": "https://business.ntt-east.co.jp/topics/2021/11_09.html"
            },
            {
              "name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU91161784.html",
              "refsource": "MISC",
              "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU91161784.html"
            },
            {
              "name": "https://jvn.jp/en/vu/JVNVU91161784/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/vu/JVNVU91161784/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2021-20844",
    "datePublished": "2021-11-24T08:25:45",
    "dateReserved": "2020-12-17T00:00:00",
    "dateUpdated": "2024-08-03T17:53:22.863Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-20843 (GCVE-0-2021-20843)

Vulnerability from cvelistv5 – Published: 2021-11-24 08:25 – Updated: 2024-08-03 17:53
VLAI?
Summary
Cross-site script inclusion vulnerability in the Web GUI of RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, and RTX1210 Rev.14.01.38 and earlier allows a remote authenticated attacker to alter the settings of the product via a specially crafted web page.
Severity ?
No CVSS data available.
CWE
  • Inclusion of Functionality from Untrusted Control Sphere
Assigner
Impacted products
Vendor Product Version
Yamaha Corporation RTX830, NVR510, NVR700W, RTX1210 Affected: RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, RTX1210 Rev.14.01.38 and earlier
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:53:22.719Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ntt-west.co.jp/smb/kiki_info/info/211109.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://business.ntt-east.co.jp/topics/2021/11_09.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU91161784.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU91161784/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "RTX830, NVR510, NVR700W, RTX1210",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, RTX1210 Rev.14.01.38 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site script inclusion vulnerability in the Web GUI of RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, and RTX1210 Rev.14.01.38 and earlier allows a remote authenticated attacker to alter the settings of the product via a specially crafted web page."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Inclusion of Functionality from Untrusted Control Sphere",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-24T08:25:44",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ntt-west.co.jp/smb/kiki_info/info/211109.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://business.ntt-east.co.jp/topics/2021/11_09.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU91161784.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/vu/JVNVU91161784/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2021-20843",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "RTX830, NVR510, NVR700W, RTX1210",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, RTX1210 Rev.14.01.38 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Yamaha Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site script inclusion vulnerability in the Web GUI of RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, and RTX1210 Rev.14.01.38 and earlier allows a remote authenticated attacker to alter the settings of the product via a specially crafted web page."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Inclusion of Functionality from Untrusted Control Sphere"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ntt-west.co.jp/smb/kiki_info/info/211109.html",
              "refsource": "MISC",
              "url": "https://www.ntt-west.co.jp/smb/kiki_info/info/211109.html"
            },
            {
              "name": "https://business.ntt-east.co.jp/topics/2021/11_09.html",
              "refsource": "MISC",
              "url": "https://business.ntt-east.co.jp/topics/2021/11_09.html"
            },
            {
              "name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU91161784.html",
              "refsource": "MISC",
              "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU91161784.html"
            },
            {
              "name": "https://jvn.jp/en/vu/JVNVU91161784/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/vu/JVNVU91161784/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2021-20843",
    "datePublished": "2021-11-24T08:25:44",
    "dateReserved": "2020-12-17T00:00:00",
    "dateUpdated": "2024-08-03T17:53:22.719Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-5548 (GCVE-0-2020-5548)

Vulnerability from cvelistv5 – Published: 2020-04-01 11:15 – Updated: 2024-08-04 08:30
VLAI?
Summary
Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier) allow remote attackers to cause a denial of service via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • Denial-of-service (DoS)
Assigner
Impacted products
Vendor Product Version
Yamaha Corporation Yamaha network devices Affected: Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T08:30:24.549Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN38732359.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN38732359/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Yamaha network devices",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier) allow remote attackers to cause a denial of service via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial-of-service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-01T11:15:15",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN38732359.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/jp/JVN38732359/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2020-5548",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Yamaha network devices",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Yamaha Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier) allow remote attackers to cause a denial of service via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial-of-service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN38732359.html",
              "refsource": "MISC",
              "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN38732359.html"
            },
            {
              "name": "https://jvn.jp/en/jp/JVN38732359/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/jp/JVN38732359/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2020-5548",
    "datePublished": "2020-04-01T11:15:15",
    "dateReserved": "2020-01-06T00:00:00",
    "dateUpdated": "2024-08-04T08:30:24.549Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-0665 (GCVE-0-2018-0665)

Vulnerability from cvelistv5 – Published: 2019-01-09 22:00 – Updated: 2024-08-05 03:35
VLAI?
Summary
Yamaha routers RT57i Rev.8.00.95 and earlier, RT58i Rev.9.01.51 and earlier, NVR500 Rev.11.00.36 and earlier, RTX810 Rev.11.01.31 and earlier, allow an administrative user to embed arbitrary scripts to the configuration data through a certain form field of the configuration page, which may be executed on another administrative user's web browser. This is a different vulnerability from CVE-2018-0666.
Severity ?
No CVSS data available.
CWE
  • Script Injection
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T03:35:49.253Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://flets-w.com/solution/kiki_info/info/180829.html"
          },
          {
            "name": "JVN#69967692",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN69967692/index.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://web116.jp/ced/support/news/contents/2018/20180829b.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN69967692.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Yamaha Broadband VoIP Router RT57i",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Rev.8.00.95 and earlier"
            }
          ]
        },
        {
          "product": "Yamaha Broadband VoIP Router RT58i",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Rev.9.01.51 and earlier"
            }
          ]
        },
        {
          "product": "Yamaha Broadband VoIP Router NVR500",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Rev.11.00.36 and earlier"
            }
          ]
        },
        {
          "product": "Yamaha Gigabit VPN Router RTX810",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Rev.11.01.31 and earlier"
            }
          ]
        },
        {
          "product": "Yamaha Firewall FWX120",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Rev.11.03.25 and earlier"
            }
          ]
        },
        {
          "product": "Biz Box Router N58i, N500, NVR500, and RTX810",
          "vendor": "NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "Biz Box Router N58i, and N500",
          "vendor": "NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-01-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Yamaha routers RT57i Rev.8.00.95 and earlier, RT58i Rev.9.01.51 and earlier, NVR500 Rev.11.00.36 and earlier, RTX810 Rev.11.01.31 and earlier, allow an administrative user to embed arbitrary scripts to the configuration data through a certain form field of the configuration page, which may be executed on another administrative user\u0027s web browser. This is a different vulnerability from CVE-2018-0666."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Script Injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-01-09T21:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://flets-w.com/solution/kiki_info/info/180829.html"
        },
        {
          "name": "JVN#69967692",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "https://jvn.jp/en/jp/JVN69967692/index.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://web116.jp/ced/support/news/contents/2018/20180829b.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN69967692.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2018-0665",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Yamaha Broadband VoIP Router RT57i",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Rev.8.00.95 and earlier"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Yamaha Broadband VoIP Router RT58i",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Rev.9.01.51 and earlier"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Yamaha Broadband VoIP Router NVR500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Rev.11.00.36 and earlier"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Yamaha Gigabit VPN Router RTX810",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Rev.11.01.31 and earlier"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Yamaha Firewall FWX120",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Rev.11.03.25 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Yamaha Corporation"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Biz Box Router N58i, N500, NVR500, and RTX810",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Biz Box Router N58i, and N500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Yamaha routers RT57i Rev.8.00.95 and earlier, RT58i Rev.9.01.51 and earlier, NVR500 Rev.11.00.36 and earlier, RTX810 Rev.11.01.31 and earlier, allow an administrative user to embed arbitrary scripts to the configuration data through a certain form field of the configuration page, which may be executed on another administrative user\u0027s web browser. This is a different vulnerability from CVE-2018-0666."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Script Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://flets-w.com/solution/kiki_info/info/180829.html",
              "refsource": "MISC",
              "url": "https://flets-w.com/solution/kiki_info/info/180829.html"
            },
            {
              "name": "JVN#69967692",
              "refsource": "JVN",
              "url": "https://jvn.jp/en/jp/JVN69967692/index.html"
            },
            {
              "name": "https://web116.jp/ced/support/news/contents/2018/20180829b.html",
              "refsource": "MISC",
              "url": "https://web116.jp/ced/support/news/contents/2018/20180829b.html"
            },
            {
              "name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN69967692.html",
              "refsource": "MISC",
              "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN69967692.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2018-0665",
    "datePublished": "2019-01-09T22:00:00",
    "dateReserved": "2017-11-27T00:00:00",
    "dateUpdated": "2024-08-05T03:35:49.253Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-0666 (GCVE-0-2018-0666)

Vulnerability from cvelistv5 – Published: 2019-01-09 22:00 – Updated: 2024-08-05 03:35
VLAI?
Summary
Yamaha routers RT57i Rev.8.00.95 and earlier, RT58i Rev.9.01.51 and earlier, NVR500 Rev.11.00.36 and earlier, RTX810 Rev.11.01.31 and earlier, allow an administrative user to embed arbitrary scripts to the configuration data through a certain form field of the configuration page, which may be executed on another administrative user's web browser. This is a different vulnerability from CVE-2018-0665.
Severity ?
No CVSS data available.
CWE
  • Script Injection
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T03:35:49.105Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://flets-w.com/solution/kiki_info/info/180829.html"
          },
          {
            "name": "JVN#69967692",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN69967692/index.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://web116.jp/ced/support/news/contents/2018/20180829b.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN69967692.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Yamaha Broadband VoIP Router RT57i",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Rev.8.00.95 and earlier"
            }
          ]
        },
        {
          "product": "Yamaha Broadband VoIP Router RT58i",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Rev.9.01.51 and earlier"
            }
          ]
        },
        {
          "product": "Yamaha Broadband VoIP Router NVR500",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Rev.11.00.36 and earlier"
            }
          ]
        },
        {
          "product": "Yamaha Gigabit VPN Router RTX810",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Rev.11.01.31 and earlier"
            }
          ]
        },
        {
          "product": "Yamaha Firewall FWX120",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Rev.11.03.25 and earlier"
            }
          ]
        },
        {
          "product": "Biz Box Router N58i, N500, NVR500, and RTX810",
          "vendor": "NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "Biz Box Router N58i, and N500",
          "vendor": "NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-01-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Yamaha routers RT57i Rev.8.00.95 and earlier, RT58i Rev.9.01.51 and earlier, NVR500 Rev.11.00.36 and earlier, RTX810 Rev.11.01.31 and earlier, allow an administrative user to embed arbitrary scripts to the configuration data through a certain form field of the configuration page, which may be executed on another administrative user\u0027s web browser. This is a different vulnerability from CVE-2018-0665."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Script Injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-01-09T21:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://flets-w.com/solution/kiki_info/info/180829.html"
        },
        {
          "name": "JVN#69967692",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "https://jvn.jp/en/jp/JVN69967692/index.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://web116.jp/ced/support/news/contents/2018/20180829b.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN69967692.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2018-0666",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Yamaha Broadband VoIP Router RT57i",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Rev.8.00.95 and earlier"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Yamaha Broadband VoIP Router RT58i",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Rev.9.01.51 and earlier"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Yamaha Broadband VoIP Router NVR500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Rev.11.00.36 and earlier"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Yamaha Gigabit VPN Router RTX810",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Rev.11.01.31 and earlier"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Yamaha Firewall FWX120",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Rev.11.03.25 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Yamaha Corporation"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Biz Box Router N58i, N500, NVR500, and RTX810",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Biz Box Router N58i, and N500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Yamaha routers RT57i Rev.8.00.95 and earlier, RT58i Rev.9.01.51 and earlier, NVR500 Rev.11.00.36 and earlier, RTX810 Rev.11.01.31 and earlier, allow an administrative user to embed arbitrary scripts to the configuration data through a certain form field of the configuration page, which may be executed on another administrative user\u0027s web browser. This is a different vulnerability from CVE-2018-0665."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Script Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://flets-w.com/solution/kiki_info/info/180829.html",
              "refsource": "MISC",
              "url": "https://flets-w.com/solution/kiki_info/info/180829.html"
            },
            {
              "name": "JVN#69967692",
              "refsource": "JVN",
              "url": "https://jvn.jp/en/jp/JVN69967692/index.html"
            },
            {
              "name": "https://web116.jp/ced/support/news/contents/2018/20180829b.html",
              "refsource": "MISC",
              "url": "https://web116.jp/ced/support/news/contents/2018/20180829b.html"
            },
            {
              "name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN69967692.html",
              "refsource": "MISC",
              "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN69967692.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2018-0666",
    "datePublished": "2019-01-09T22:00:00",
    "dateReserved": "2017-11-27T00:00:00",
    "dateUpdated": "2024-08-05T03:35:49.105Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}