28 lines
1.5 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-22372",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-01-24T05:15:14.137",
"lastModified": "2024-01-24T13:49:03.187",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Affected products and versions are as follows: WRC-X1800GS-B v1.17 and earlier, WRC-X1800GSA-B v1.17 and earlier, WRC-X1800GSH-B v1.17 and earlier, WRC-X6000XS-G v1.09, and WRC-X6000XST-G v1.12 and earlier."
},
{
"lang": "es",
"value": "La vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en los routers LAN inal\u00e1mbricos ELECOM permite que un atacante adyacente a la red con privilegios administrativos ejecute comandos arbitrarios del sistema operativo enviando una solicitud especialmente manipulada al producto. Los productos y versiones afectados son los siguientes: WRC-X1800GS-B v1.17 y anteriores, WRC-X1800GSA-B v1.17 y anteriores, WRC-X1800GSH-B v1.17 y anteriores, WRC-X6000XS-G v1.09, y WRC-X6000XST-G v1.12 y anteriores."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU90908488/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.elecom.co.jp/news/security/20240123-01/",
"source": "vultures@jpcert.or.jp"
}
]
}