First published: Wed Jan 24 2024(Updated: )
Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Yamaha Wlx222 Firmware | <24.00.04 | |
Yamaha Wlx222 | ||
All of | ||
Yamaha Wlx413 Firmware | <22.00.06 | |
Yamaha Wlx413 | ||
All of | ||
Yamaha Wlx212 Firmware | <21.00.13 | |
Yamaha Wlx212 | ||
All of | ||
Yamaha Wlx313 Firmware | <18.00.13 | |
Yamaha Wlx313 | ||
All of | ||
Yamaha Wlx202 Firmware | <16.00.19 | |
Yamaha Wlx202 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.