First published: Tue Oct 06 2020(Updated: )
ELECOM LAN routers (WRC-2533GST2 firmware versions prior to v1.14, WRC-1900GST2 firmware versions prior to v1.14, WRC-1750GST2 firmware versions prior to v1.14, and WRC-1167GST2 firmware versions prior to v1.10) allow an attacker on the same network segment to execute arbitrary OS commands with a root privilege via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Elecom Wrc-2533gst2 Firmware | <1.14 | |
Elecom Wrc-2533gst2 | ||
Elecom Wrc-1900gst2 Firmware | <1.14 | |
Elecom Wrc-1900gst2 | ||
Elecom Wrc-1750gst2 Firmware | <1.14 | |
Elecom Wrc-1750gst2 | ||
Elecom Wrc-1167gst2 Firmware | <1.10 | |
Elecom Wrc-1167gst2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-5634 is high, with a severity value of 8.8.
ELECOM LAN routers such as WRC-2533GST2, WRC-1900GST2, WRC-1750GST2, and WRC-1167GST2 are affected by CVE-2020-5634.
CVE-2020-5634 allows an attacker on the same network segment to execute arbitrary OS commands with root privileges.
Update the firmware of the affected ELECOM LAN routers to version 1.14 for WRC-2533GST2, WRC-1900GST2, and WRC-1750GST2, and version 1.10 for WRC-1167GST2.
You can find more information about CVE-2020-5634 on the JVN website (https://jvn.jp/en/jp/JVN82892096/index.html) and the ELECOM security advisory (https://www.elecom.co.jp/news/security/20201005-01/).