29 lines
1.3 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-25568",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-04-04T00:15:06.990",
"lastModified": "2024-06-12T01:15:49.033",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent unauthenticated attacker to execute arbitrary OS commands by sending a specially crafted request to the product. Affected products and versions are as follows: WRC-X3200GST3-B v1.25 and earlier, WRC-G01-W v1.24 and earlier, and WMC-X1800GST-B v1.41 and earlier. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit \"WMC-2LX-B\"."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en WRC-X3200GST3-B v1.25 y anteriores, y WRC-G01-W v1.24 y anteriores permite que un atacante no autenticado adyacente a la red ejecute comandos arbitrarios del sistema operativo enviando una solicitud especialmente manipulada al producto."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU95381465/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.elecom.co.jp/news/security/20240326-01/",
"source": "vultures@jpcert.or.jp"
}
]
}