Description
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent unauthenticated attacker to execute arbitrary OS commands by sending a specially crafted request to the product. Affected products and versions are as follows: WRC-X3200GST3-B v1.25 and earlier, WRC-G01-W v1.24 and earlier, and WMC-X1800GST-B v1.41 and earlier. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
Published: 2024-04-04
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2024-08-01T23:44:09.663Z

Reserved: 2024-03-19T02:32:13.324Z

Link: CVE-2024-25568

cve-icon Vulnrichment

Updated: 2024-08-01T23:44:09.663Z

cve-icon NVD

Status : Deferred

Published: 2024-04-04T00:15:06.990

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-25568

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses