First published: Wed Feb 28 2024(Updated: )
Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B".
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
ELECOM wireless LAN router | ||
ELECOM Wireless LAN Repeater | ||
Elecom Wmc-x1800gst-b Firmware | ||
Elecom WSC-X1800GS-B | ||
ELECOM e-Mesh Starter Kit WMC-2LX-B | ||
All of | ||
<1.73 | ||
All of | ||
<1.73 | ||
All of | ||
<1.34 | ||
All of | ||
<1.68 | ||
All of | ||
<1.68 | ||
All of | ||
<1.68 | ||
All of | ||
<1.31 | ||
All of | ||
<1.27 | ||
All of | ||
<1.26 | ||
All of | ||
<1.42 | ||
All of | ||
<1.42 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23910 has been classified as a moderate severity cross-site request forgery (CSRF) vulnerability.
To mitigate CVE-2024-23910, update the affected ELECOM devices to the latest firmware version available.
CVE-2024-23910 affects several ELECOM wireless LAN routers and wireless LAN repeaters, including models like WRC-1167GS2-B and WMC-X1800GST-B.
CVE-2024-23910 can be exploited by remote unauthenticated attackers to perform unauthorized operations by hijacking the administrator's authentication.
No, exploitation of CVE-2024-23910 does not require authentication, making it particularly concerning for affected devices.