First published: Fri Feb 12 2021(Updated: )
ELECOM WRC-300FEBK-S contains an improper certificate validation vulnerability. Via a man-in-the-middle attack, an attacker may alter the communication response. As a result, an arbitrary OS command may be executed on the affected device.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Elecom Wrc-300febk-s Firmware | ||
ELECOM WRC-300FEBK-S |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20649 is a vulnerability found in ELECOM WRC-300FEBK-S that allows an attacker to execute arbitrary OS commands through a man-in-the-middle attack.
An attacker can exploit CVE-2021-20649 by intercepting and altering the communication response between the affected device and the legitimate server.
CVE-2021-20649 has a severity rating of 4.8 out of 10, indicating a medium level of severity.
To fix CVE-2021-20649, apply the latest firmware update provided by ELECOM WRC-300FEBK-S.
You can find more information about CVE-2021-20649 on the official website of JVN (Japan Vulnerability Notes) and the official security advisory from ELECOM.