Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44679 | OS command injection vulnerability in ELECOM wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. |
Thu, 03 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Sep 2024 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OS command injection vulnerability in ELECOM network devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WAB-S600-PS all versions, WAB-S300 all versions, WAB-M1775-PS v1.1.21 and earlier, WAB-S1775 v1.1.9 and earlier, WAB-S1167 v1.0.7 and earlier, and WAB-M2133 v1.3.22 and earlier. | OS command injection vulnerability in ELECOM wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. |
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2025-07-03T14:01:25.610Z
Reserved: 2023-08-09T11:54:59.361Z
Link: CVE-2023-40072
Updated: 2024-08-02T18:24:55.046Z
Status : Modified
Published: 2023-08-18T10:15:12.847
Modified: 2025-07-03T14:15:25.430
Link: CVE-2023-40072
No data.
OpenCVE Enrichment
No data.
EUVD