First published: Wed Jan 24 2024(Updated: )
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Elecom Wrc-x1800gs-b Firmware | <1.18 | |
Elecom Wrc-x1800gs-b | ||
All of | ||
Elecom Wrc-x1800gsh-b Firmware | <1.18 | |
Elecom Wrc-x1800gsh-b | ||
All of | ||
Elecom Wrc-x1800gsa-b Firmware | <1.18 | |
Elecom Wrc-x1800gsa-b | ||
All of | ||
Elecom Wrc-x6000xs-g Firmware | =1.09 | |
Elecom Wrc-x6000xs-g | ||
All of | ||
Elecom Wrc-x6000xst-g Firmware | <1.14 | |
Elecom Wrc-x6000xst-g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22372 is a high-severity OS command injection vulnerability in ELECOM wireless LAN routers.
To fix CVE-2024-22372, update your ELECOM wireless LAN router firmware to versions above 1.18.
CVE-2024-22372 affects models such as WRC-X1800GS-B, WRC-X1800GSH-B, WRC-X1800GSA-B, WRC-X6000XS-G, and WRC-X6000XST-G with specific firmware versions.
No, an attacker must have network-adjacent access and administrative privileges to exploit CVE-2024-22372.
CVE-2024-22372 allows attackers to execute arbitrary OS commands on vulnerable ELECOM wireless LAN routers.