First published: Fri Aug 18 2023(Updated: )
OS command injection vulnerability in ELECOM wireless LAN routers allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WRC-600GHBK-A all versions, WRC-1467GHBK-A all versions, WRC-1900GHBK-A all versions, WRC-733FEBK2-A all versions, WRC-F1167ACF2 all versions, WRC-1467GHBK-S all versions, and WRC-1900GHBK-S all versions.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Elecom Wrc-600ghbk-a Firmware | ||
Elecom Wrc-600ghbk-a | ||
Elecom Wrc-1467ghbk-a Firmware | ||
ELECOM WRC-1467GHBK-A | ||
Elecom Wrc-1900ghbk-a Firmware | ||
Elecom Wrc-1900ghbk-a | ||
Elecom Wrc-733febk2-a Firmware | ||
Elecom Wrc-733febk2-a | ||
Elecom Wrc-f1167acf2 Firmware | ||
Elecom Wrc-f1167acf2 | ||
Elecom Wrc-1467ghbk-s Firmware | ||
Elecom Wrc-1467ghbk-s | ||
Elecom Wrc-1900ghbk-s Firmware | ||
Elecom Wrc-1900ghbk-s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this ELECOM wireless LAN routers vulnerability is CVE-2023-39455.
The severity of CVE-2023-39455 is high. The severity value is 8.8.
The OS command injection vulnerability in ELECOM wireless LAN routers allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request.
The ELECOM wireless LAN routers affected by this vulnerability are WRC-600GHBK-A, WRC-1467GHBK-A, WRC-1900GHBK-A, WRC-733febk2-a, WRC-f1167acf2, WRC-1467ghbk-s, WRC-1900ghbk-s.
To fix the vulnerability in your ELECOM wireless LAN router, you should apply the latest firmware update provided by ELECOM. Make sure to regularly check for firmware updates and apply them as soon as they are available.