### [CVE-2024-43689](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43689) ![](https://img.shields.io/static/v1?label=Product&message=WAB-I1750-PS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WAB-M1775-PS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WAB-S1167-PS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WAB-S1775&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WAB-S733MI&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=v1.3.2%20and%20earlier%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=v1.5.10%20and%20earlier%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=v1.5.6%20and%20earlier%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=v2.1.4%20and%20earlier%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Stack-based%20buffer%20overflow&color=brightgreen) ### Description Stack-based buffer overflow vulnerability exists in ELECOM wireless access points. By processing a specially crafted HTTP request, arbitrary code may be executed. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub