8.8
CVE-2023-39222
- EPSS 0.8%
- Veröffentlicht 03.10.2023 01:15:56
- Zuletzt bearbeitet 21.11.2024 08:14:56
- Quelle vultures@jpcert.or.jp
- CVE-Watchlists
- Unerledigt
OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command that is not intended to be executed from the web interface by sending a specially crafted request. Affected products and versions are as follows: ACERA 1320 firmware ver.01.26 and earlier, ACERA 1310 firmware ver.01.26 and earlier, ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, ACERA 1020 firmware ver.01.86 and earlier, ACERA 1010 firmware ver.01.86 and earlier, ACERA 950 firmware ver.01.60 and earlier, ACERA 850F firmware ver.01.60 and earlier, ACERA 900 firmware ver.02.54 and earlier, ACERA 850M firmware ver.02.06 and earlier, ACERA 810 firmware ver.03.74 and earlier, and ACERA 800ST firmware ver.07.35 and earlier. They are affected when running in ST(Standalone) mode.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Furunosystems ≫ Acera 1310 Firmware Version <= 01.26
Furunosystems ≫ Acera 1320 Firmware Version <= 01.26
Furunosystems ≫ Acera 1210 Firmware Version <= 02.36
Furunosystems ≫ Acera 1150i Firmware Version <= 01.35
Furunosystems ≫ Acera 1150w Firmware Version <= 01.35
Furunosystems ≫ Acera 1110 Firmware Version <= 01.76
Furunosystems ≫ Acera 1020 Firmware Version <= 01.86
Furunosystems ≫ Acera 1010 Firmware Version <= 01.86
Furunosystems ≫ Acera 950 Firmware Version <= 01.60
Furunosystems ≫ Acera 850f Firmware Version <= 01.60
Furunosystems ≫ Acera 900 Firmware Version <= 02.54
Furunosystems ≫ Acera 850m Firmware Version <= 02.06
Furunosystems ≫ Acera 810 Firmware Version <= 03.74
Furunosystems ≫ Acera 800st Firmware Version <= 07.35
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.8% | 0.733 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.