cve/2024/CVE-2024-23910.md
2025-09-29 16:08:36 +00:00

34 lines
2.3 KiB
Markdown

### [CVE-2024-23910](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23910)
![](https://img.shields.io/static/v1?label=Product&message=WMC-X1800GST-B&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WRC-1167GS2-B&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WRC-1167GS2H-B&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WRC-1167GST2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WRC-2533GS2-B&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WRC-2533GS2-W&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WRC-2533GS2V-B&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WRC-2533GST2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WRC-G01-W&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WRC-X3200GST3-B&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WSC-X1800GS-B&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.24%20and%20earlier%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.25%20and%20earlier%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.30%20and%20earlier%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.32%20and%20earlier%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.41%20and%20earlier%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.62%20and%20earlier%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.67%20and%20earlier%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-site%20request%20forgery%20(CSRF)&color=brighgreen)
### Description
Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B".
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds