6.8
CVE-2024-22366
- EPSS 0.08%
- Veröffentlicht 24.01.2024 05:15:13
- Zuletzt bearbeitet 21.11.2024 08:56:07
- Quelle vultures@jpcert.or.jp
- Teams Watchlist Login
- Unerledigt Login
Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Yamaha ≫ Wlx222 Firmware Version < 24.00.04
Yamaha ≫ Wlx413 Firmware Version < 22.00.06
Yamaha ≫ Wlx212 Firmware Version < 21.00.13
Yamaha ≫ Wlx313 Firmware Version < 18.00.13
Yamaha ≫ Wlx202 Firmware Version < 16.00.19
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.08% | 0.251 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.8 | 0.9 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.