First published: Thu Aug 01 2024(Updated: )
Cross-site request forgery vulnerability exists in ELECOM wireless LAN routers. Viewing a malicious page while logging in to the affected product with an administrative privilege, the user may be directed to perform unintended operations such as changing the login ID, login password, etc.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
<1.69 | ||
All of | ||
<1.69 | ||
All of | ||
<1.69 | ||
All of | ||
<1.12 | ||
All of | ||
<1.12 | ||
All of | ||
<1.12 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40883 is classified as a medium-severity cross-site request forgery vulnerability.
To fix CVE-2024-40883, update your ELECOM wireless LAN router firmware to the latest version beyond 1.69.
CVE-2024-40883 affects various models of ELECOM wireless LAN routers with firmware versions lower than 1.69.
The potential risks of CVE-2024-40883 include unauthorized changes to login credentials and other administrative settings.
Mitigating CVE-2024-40883 without updating firmware is challenging, but avoiding login to the device while browsing untrusted pages may help reduce risk.