First published: Thu Apr 04 2024(Updated: )
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent unauthenticated attacker to execute arbitrary OS commands by sending a specially crafted request to the product. Affected products and versions are as follows: WRC-X3200GST3-B v1.25 and earlier, WRC-G01-W v1.24 and earlier, and WMC-X1800GST-B v1.41 and earlier. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Elecom Wrc-x3200gst3-b Firmware | <1.25 | |
Elecom Wrc-g01-w Firmware | <1.24 | |
Elecom Wmc-x1800gst-b Firmware | <1.41 | |
ELECOM e-Mesh Starter Kit WMC-2LX-B | < |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25568 is classified as a high-severity vulnerability due to its potential for arbitrary OS command execution by unauthenticated attackers.
To fix CVE-2024-25568, update the affected ELECOM router firmware to the latest version provided by the manufacturer.
CVE-2024-25568 affects several ELECOM products including WRC-X3200GST3-B v1.25 and earlier, WRC-G01-W v1.24 and earlier, and WMC-X1800GST-B v1.41 and earlier.
An attacker can exploit CVE-2024-25568 to execute arbitrary OS commands remotely if they are on the same network as the vulnerable device.
CVE-2024-25568 is considered a remote vulnerability as it allows network-adjacent attackers to exploit it without requiring physical access to the device.