First published: Mon Oct 21 2024(Updated: )
Stack-based buffer overflow vulnerability exists in ELECOM wireless access points. By processing a specially crafted HTTP request, arbitrary code may be executed.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
<=1.5.10 | ||
All of | ||
<=1.5.6 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43689 is classified as a critical severity vulnerability due to its ability to allow arbitrary code execution.
To fix CVE-2024-43689, update affected ELECOM devices to the latest firmware version released by the vendor.
CVE-2024-43689 affects the ELECOM WAB-i1750-PS firmware versions up to and including 1.5.10 and the WAB-S1167-PS firmware versions up to and including 1.5.6.
CVE-2024-43689 is a stack-based buffer overflow vulnerability that can be triggered by processing specially crafted HTTP requests.
Yes, CVE-2024-43689 can be exploited remotely by sending crafted HTTP requests to the vulnerable devices.