OS command injection vulnerability in ELECOM wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request.
References
Link | Resource |
---|---|
https://jvn.jp/en/vu/JVNVU91630351/ | Third Party Advisory |
https://www.elecom.co.jp/news/security/20230810-01/ | Vendor Advisory |
https://www.elecom.co.jp/news/security/20231114-01/ | |
https://jvn.jp/en/vu/JVNVU91630351/ | Third Party Advisory |
https://www.elecom.co.jp/news/security/20230810-01/ | Vendor Advisory |
https://www.elecom.co.jp/news/security/20231114-01/ |
Configurations
History
No history.
Information
Published : 2023-08-18 10:15
Updated : 2024-11-21 08:18
NVD link : CVE-2023-40072
Mitre link : CVE-2023-40072
CVE.ORG link : CVE-2023-40072
JSON object : View
Products Affected
elecom
- wab-s600-ps_firmware
- wab-s600-ps
- wab-s300
- wab-s300_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')