GSD-2024-21798
Vulnerability from gsd - Updated: 2024-02-15 06:02Details
ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, and WRC-2533GS2V-B v1.62 and earlier.
Aliases
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-21798"
],
"details": "ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, and WRC-2533GS2V-B v1.62 and earlier.",
"id": "GSD-2024-21798",
"modified": "2024-02-15T06:02:22.526175Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2024-21798",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WRC-1167GS2-B",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "v1.67 and earlier"
}
]
}
},
{
"product_name": "WRC-1167GS2H-B",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "v1.67 and earlier"
}
]
}
},
{
"product_name": "WRC-2533GS2-B",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "v1.62 and earlier"
}
]
}
},
{
"product_name": "WRC-2533GS2-W",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "v1.62 and earlier"
}
]
}
},
{
"product_name": "WRC-2533GS2V-B",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "v1.62 and earlier"
}
]
}
},
{
"product_name": "WRC-X3200GST3-B",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "v1.25 and earlier"
}
]
}
},
{
"product_name": "WRC-G01-W",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "v1.24 and earlier"
}
]
}
}
]
},
"vendor_name": "ELECOM CO.,LTD."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, WRC-2533GS2V-B v1.62 and earlier, WRC-X3200GST3-B v1.25 and earlier, and WRC-G01-W v1.24 and earlier."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.elecom.co.jp/news/security/20240220-01/",
"refsource": "MISC",
"url": "https://www.elecom.co.jp/news/security/20240220-01/"
},
{
"name": "https://jvn.jp/en/jp/JVN44166658/",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN44166658/"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, WRC-2533GS2V-B v1.62 and earlier, WRC-X3200GST3-B v1.25 and earlier, and WRC-G01-W v1.24 and earlier."
},
{
"lang": "es",
"value": "Los enrutadores de LAN inal\u00e1mbrica ELECOM contienen una vulnerabilidad de cross-site scripting. Supongamos que un usuario administrativo malintencionado configura el producto afectado con contenido especialmente manipulado. Cuando otro usuario administrativo inicia sesi\u00f3n y opera el producto, se puede ejecutar un script arbitrario en el navegador web. Los productos y versiones afectados son los siguientes: WRC-1167GS2-B v1.67 y anteriores, WRC-1167GS2H-B v1.67 y anteriores, WRC-2533GS2-B v1.62 y anteriores, WRC-2533GS2-W v1.62 y anteriores y WRC-2533GS2V-B v1.62 y anteriores."
}
],
"id": "CVE-2024-21798",
"lastModified": "2024-04-04T01:15:49.953",
"metrics": {},
"published": "2024-02-28T23:15:09.453",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "https://jvn.jp/en/jp/JVN44166658/"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://www.elecom.co.jp/news/security/20240220-01/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Awaiting Analysis"
}
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…