First published: Fri Aug 30 2024(Updated: )
Cross-site scripting vulnerability exists in ELECOM wireless access points due to improper processing of input values in menu.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Elecom Wab-s1167-ps Firmware | <=1.5.6 | |
Elecom Wab-s1167-ps | ||
All of | ||
Elecom Wab-i1750-ps Firmware | <=1.5.10 | |
Elecom Wab-i1750-ps |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42412 is classified as a high-severity cross-site scripting vulnerability.
To fix CVE-2024-42412, update the firmware of the affected ELECOM wireless access points to the latest version.
CVE-2024-42412 affects ELECOM wireless access points including the Wab-s1167-ps and Wab-i1750-ps models with their respective firmware versions.
The risks of CVE-2024-42412 include potential execution of arbitrary scripts in the user's web browser when visiting a malicious page while logged in.
CVE-2024-42412 exploits cross-site scripting through improper processing of input values in menu.cgi within the affected ELECOM devices.