Description
Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.
Published: 2024-01-24
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Yamaha Wlx202 Wlx202 Firmware Wlx212 Wlx212 Firmware Wlx222 Wlx222 Firmware Wlx313 Wlx313 Firmware Wlx413 Wlx413 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2025-06-20T19:27:11.652Z

Reserved: 2024-01-09T07:04:26.494Z

Link: CVE-2024-22366

cve-icon Vulnrichment

Updated: 2024-08-01T22:43:34.585Z

cve-icon NVD

Status : Modified

Published: 2024-01-24T05:15:13.823

Modified: 2025-06-20T20:15:28.973

Link: CVE-2024-22366

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses