Vulnerabilites related to elecom - wrc-2533gs2v-b
cve-2024-40883
Vulnerability from cvelistv5
Published
2024-08-01 01:18
Modified
2025-02-17 05:38
Severity ?
EPSS score ?
Summary
Cross-site request forgery vulnerability exists in ELECOM wireless LAN routers. Viewing a malicious page while logging in to the affected product with an administrative privilege, the user may be directed to perform unintended operations such as changing the login ID, login password, etc.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ELECOM CO.,LTD. | WRC-X1500GS-B |
Version: v1.11 and earlier |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-40883", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T14:24:58.175059Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-27T01:09:06.684Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WRC-X1500GS-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X1500GSA-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X1800GS-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.18 and earlier" } ] }, { "product": "WRC-X1800GSA-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.18 and earlier" } ] }, { "product": "WRC-X1800GSH-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.18 and earlier" } ] }, { "product": "WRC-X3000GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2A-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-XE5400GS-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.12 and earlier" } ] }, { "product": "WRC-XE5400GSA-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.12 and earlier" } ] }, { "product": "WRC-X6000QS-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.13 and earlier" } ] }, { "product": "WRC-X6000QSA-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.13 and earlier" } ] }, { "product": "WRC-X6000XS-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.11 and earlier" } ] }, { "product": "WRC-X6000XST-G", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.14 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery vulnerability exists in ELECOM wireless LAN routers. Viewing a malicious page while logging in to the affected product with an administrative privilege, the user may be directed to perform unintended operations such as changing the login ID, login password, etc." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "Cross-site request forgery (CSRF)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-17T05:38:38.595Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20240730-01/" }, { "url": "https://jvn.jp/en/jp/JVN06672778/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-40883", "datePublished": "2024-08-01T01:18:01.801Z", "dateReserved": "2024-07-26T08:52:14.749Z", "dateUpdated": "2025-02-17T05:38:38.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23910
Vulnerability from cvelistv5
Published
2024-02-28 23:07
Modified
2024-11-26 08:07
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B".
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ELECOM CO.,LTD. | WRC-1167GS2-B |
Version: v1.67 and earlier |
|||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:elecom:wrc-1167gs2-b:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wrc-1167gs2-b", "vendor": "elecom", "versions": [ { "lessThan": "v1.67", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:elecom:wrc-1167gs2h-b:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wrc-1167gs2h-b", "vendor": "elecom", "versions": [ { "lessThan": "v1.67", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wrc-2533gs2-b", "vendor": "elecom", "versions": [ { "lessThan": "v1.62", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wrc-2533gs2-w", "vendor": "elecom", "versions": [ { "lessThan": "v1.62", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:elecom:wrc-2533gs2v-b:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wrc-2533gs2v-b", "vendor": "elecom", "versions": [ { "lessThan": "v1.62", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:elecom:wrc-x3200gst3-b_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wrc-x3200gst3-b_firmware", "vendor": "elecom", "versions": [ { "lessThan": "v1.25", "status": "affected", "version": "elecom", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:elecom:wrc-g01-w_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wrc-g01-w_firmware", "vendor": "elecom", "versions": [ { "lessThan": "v1.24", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:elecom:wmc-x1800gst-b:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wmc-x1800gst-b", "vendor": "elecom", "versions": [ { "lessThan": "v1.41", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:elecom:wsc-x1800gs-b:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wsc-x1800gs-b", "vendor": "elecom", "versions": [ { "lessThan": "v1.41", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-23910", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-05T20:40:19.820700Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T16:18:46.820Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:13:08.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20240220-01/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN44166658/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WRC-1167GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.67 and earlier" } ] }, { "product": "WRC-1167GS2H-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.67 and earlier" } ] }, { "product": "WRC-1167GST2", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.32 and earlier" } ] }, { "product": "WRC-2533GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.62 and earlier" } ] }, { "product": "WRC-2533GS2-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.62 and earlier" } ] }, { "product": "WRC-2533GS2V-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.62 and earlier" } ] }, { "product": "WRC-2533GST2", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.30 and earlier" } ] }, { "product": "WRC-X3200GST3-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.25 and earlier" } ] }, { "product": "WRC-G01-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.24 and earlier" } ] }, { "product": "WMC-X1800GST-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.41 and earlier" } ] }, { "product": "WSC-X1800GS-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.41 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit \"WMC-2LX-B\"." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "Cross-site request forgery (CSRF)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-26T08:07:41.689Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20240220-01/" }, { "url": "https://jvn.jp/en/jp/JVN44166658/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-23910", "datePublished": "2024-02-28T23:07:02.324Z", "dateReserved": "2024-02-15T01:25:06.163Z", "dateUpdated": "2024-11-26T08:07:41.689Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-21798
Vulnerability from cvelistv5
Published
2024-02-28 23:03
Modified
2024-11-26 08:07
Severity ?
EPSS score ?
Summary
ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ELECOM CO.,LTD. | WRC-1167GS2-B |
Version: v1.67 and earlier |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21798", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-14T19:43:48.346433Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:08:56.473Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20240220-01/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN44166658/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WRC-1167GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.67 and earlier" } ] }, { "product": "WRC-1167GS2H-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.67 and earlier" } ] }, { "product": "WRC-1167GST2", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.32 and earlier" } ] }, { "product": "WRC-2533GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.62 and earlier" } ] }, { "product": "WRC-2533GS2-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.62 and earlier" } ] }, { "product": "WRC-2533GS2V-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.62 and earlier" } ] }, { "product": "WRC-2533GST2", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.30 and earlier" } ] }, { "product": "WRC-X3200GST3-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.25 and earlier" } ] }, { "product": "WRC-G01-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.24 and earlier" } ] }, { "product": "WMC-X1800GST-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.41 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit \"WMC-2LX-B\"." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Cross-site scripting (XSS)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-26T08:07:04.819Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20240220-01/" }, { "url": "https://jvn.jp/en/jp/JVN44166658/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-21798", "datePublished": "2024-02-28T23:03:39.483Z", "dateReserved": "2024-02-15T01:25:08.021Z", "dateUpdated": "2024-11-26T08:07:04.819Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2024-08-01 02:15
Modified
2024-11-26 09:15
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Summary
Cross-site request forgery vulnerability exists in ELECOM wireless LAN routers. Viewing a malicious page while logging in to the affected product with an administrative privilege, the user may be directed to perform unintended operations such as changing the login ID, login password, etc.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN06672778/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.elecom.co.jp/news/security/20240730-01/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62F4C8BB-6DA7-4227-BDE9-3113CEFA110A", "versionEndExcluding": "1.69", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9FF3CB7-7F2E-472A-A2A3-ED599F4FC99C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77A56640-4A80-4338-9BBF-901088D26193", "versionEndExcluding": "1.69", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0FE-1232-4C39-AA86-2D616E4D39C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-2533gs2v-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3892264D-1108-432F-83EA-E027A6AA0610", "versionEndExcluding": "1.69", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-2533gs2v-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "69FF2911-A946-4E48-B50A-F1F5EC95BBCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-x6000xs-g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1309B92-8C27-488A-8190-A164502EE615", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-x6000xs-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D50F2091-30D4-4A3E-A28A-B9D67D70DB2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-x1500gs-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C34B5CB1-4483-49B0-B281-1F61045785C7", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-x1500gs-b:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2B13224-1E88-4415-8B8E-979D00BD68F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-x1500gsa-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82A4CAE8-0C68-4881-92F3-6BFFD72A58CA", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-x1500gsa-b:*:*:*:*:*:*:*:*", "matchCriteriaId": "D198866F-7CB3-4EA0-86EA-345CF65E116F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery vulnerability exists in ELECOM wireless LAN routers. Viewing a malicious page while logging in to the affected product with an administrative privilege, the user may be directed to perform unintended operations such as changing the login ID, login password, etc." }, { "lang": "es", "value": " Existe una vulnerabilidad de Cross-site request forgery en los enrutadores LAN inal\u00e1mbricos ELECOM. Al ver una p\u00e1gina maliciosa mientras inicia sesi\u00f3n en el producto afectado con un privilegio administrativo, se puede dirigir al usuario a realizar operaciones no deseadas, como cambiar el ID de inicio de sesi\u00f3n, la contrase\u00f1a de inicio de sesi\u00f3n, etc." } ], "id": "CVE-2024-40883", "lastModified": "2024-11-26T09:15:06.443", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "vultures@jpcert.or.jp", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-08-01T02:15:02.023", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN06672778/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.elecom.co.jp/news/security/20240730-01/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "vultures@jpcert.or.jp", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-28 23:15
Modified
2025-02-14 15:32
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B".
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN44166658/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.elecom.co.jp/news/security/20240220-01/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN44166658/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.elecom.co.jp/news/security/20240220-01/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-1167gs2-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "562FC1F4-4B24-427E-981F-FABA8C270E24", "versionEndExcluding": "1.73", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-1167gs2-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C37403-F848-4FD4-9AC3-FED5BF871163", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-1167gs2h-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4044F887-CB21-49E5-A6F5-E8D6FF13E757", "versionEndExcluding": "1.73", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-1167gs2h-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9E9EB42-AFE2-44DB-83A3-A9E74BB9A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "185BD8AF-8C0C-4528-9CF3-6C6FC7869C0E", "versionEndExcluding": "1.34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9045F74-985E-4C3C-AC10-14FD9B61A746", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAE30FA6-A244-4781-9397-7A56E74B7FF8", "versionEndExcluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9FF3CB7-7F2E-472A-A2A3-ED599F4FC99C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A6660BB-9A29-4C6E-8E6C-9AAD663669A7", "versionEndExcluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0FE-1232-4C39-AA86-2D616E4D39C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-2533gs2v-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EAD43E5-BC22-4008-BA9B-97DD6F3344D4", "versionEndExcluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-2533gs2v-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "69FF2911-A946-4E48-B50A-F1F5EC95BBCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A42CBC3B-C096-4622-8072-3CE279FBA4A0", "versionEndExcluding": "1.31", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*", "matchCriteriaId": "85BF0A23-43C9-4497-BDDF-9366642503ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-x3200gst3-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82307DBF-148B-4D72-8BB2-1574068A3E4E", "versionEndExcluding": "1.27", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-x3200gst3-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DF4AD14-A9E3-4797-A201-BBE34BBCEDD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-g01-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "09D59756-26E6-4FFE-8C4C-09904BE42A7E", "versionEndExcluding": "1.26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-g01-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFAFF4E-7884-455C-AE6D-B5600C0EEA73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wmc-x1800gst-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "864689A8-CA48-466F-B675-47F777F948AC", "versionEndExcluding": "1.42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wmc-x1800gst-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "40476229-3AC2-4A0F-BCC4-A170879441F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wsc-x1800gs-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69C6859E-9EE5-45C9-BE42-22D0F6DED34C", "versionEndExcluding": "1.42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wsc-x1800gs-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "F150E210-8EDC-4183-BF72-F115A82F8E5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit \"WMC-2LX-B\"." }, { "lang": "es", "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en los enrutadores LAN inal\u00e1mbricos ELECOM permite a un atacante remoto no autenticado secuestrar la autenticaci\u00f3n de los administradores y realizar operaciones no deseadas en el producto afectado. Los productos y versiones afectados son los siguientes: WRC-1167GS2-B v1.67 y anteriores, WRC-1167GS2H-B v1.67 y anteriores, WRC-2533GS2-B v1.62 y anteriores, WRC-2533GS2-W v1.62 y anteriores y WRC-2533GS2V-B v1.62 y anteriores." } ], "id": "CVE-2024-23910", "lastModified": "2025-02-14T15:32:35.843", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "vultures@jpcert.or.jp", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-02-28T23:15:09.557", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN44166658/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.elecom.co.jp/news/security/20240220-01/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN44166658/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.elecom.co.jp/news/security/20240220-01/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "vultures@jpcert.or.jp", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-28 23:15
Modified
2025-02-14 15:32
Severity ?
Summary
ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN44166658/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.elecom.co.jp/news/security/20240220-01/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN44166658/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.elecom.co.jp/news/security/20240220-01/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-1167gs2-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "562FC1F4-4B24-427E-981F-FABA8C270E24", "versionEndExcluding": "1.73", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-1167gs2-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C37403-F848-4FD4-9AC3-FED5BF871163", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-1167gs2h-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4044F887-CB21-49E5-A6F5-E8D6FF13E757", "versionEndExcluding": "1.73", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-1167gs2h-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9E9EB42-AFE2-44DB-83A3-A9E74BB9A010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "185BD8AF-8C0C-4528-9CF3-6C6FC7869C0E", "versionEndExcluding": "1.34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9045F74-985E-4C3C-AC10-14FD9B61A746", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAE30FA6-A244-4781-9397-7A56E74B7FF8", "versionEndExcluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9FF3CB7-7F2E-472A-A2A3-ED599F4FC99C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A6660BB-9A29-4C6E-8E6C-9AAD663669A7", "versionEndExcluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0FE-1232-4C39-AA86-2D616E4D39C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-2533gs2v-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EAD43E5-BC22-4008-BA9B-97DD6F3344D4", "versionEndExcluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-2533gs2v-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "69FF2911-A946-4E48-B50A-F1F5EC95BBCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A42CBC3B-C096-4622-8072-3CE279FBA4A0", "versionEndExcluding": "1.31", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*", "matchCriteriaId": "85BF0A23-43C9-4497-BDDF-9366642503ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-x3200gst3-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82307DBF-148B-4D72-8BB2-1574068A3E4E", "versionEndExcluding": "1.27", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-x3200gst3-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DF4AD14-A9E3-4797-A201-BBE34BBCEDD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-g01-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "09D59756-26E6-4FFE-8C4C-09904BE42A7E", "versionEndExcluding": "1.26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-g01-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFAFF4E-7884-455C-AE6D-B5600C0EEA73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wmc-x1800gst-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "864689A8-CA48-466F-B675-47F777F948AC", "versionEndExcluding": "1.42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wmc-x1800gst-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "40476229-3AC2-4A0F-BCC4-A170879441F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit \"WMC-2LX-B\"." }, { "lang": "es", "value": "Los enrutadores de LAN inal\u00e1mbrica ELECOM contienen una vulnerabilidad de cross-site scripting. Supongamos que un usuario administrativo malintencionado configura el producto afectado con contenido especialmente manipulado. Cuando otro usuario administrativo inicia sesi\u00f3n y opera el producto, se puede ejecutar un script arbitrario en el navegador web. Los productos y versiones afectados son los siguientes: WRC-1167GS2-B v1.67 y anteriores, WRC-1167GS2H-B v1.67 y anteriores, WRC-2533GS2-B v1.62 y anteriores, WRC-2533GS2-W v1.62 y anteriores y WRC-2533GS2V-B v1.62 y anteriores." } ], "id": "CVE-2024-21798", "lastModified": "2025-02-14T15:32:23.757", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "vultures@jpcert.or.jp", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-28T23:15:09.453", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN44166658/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.elecom.co.jp/news/security/20240220-01/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN44166658/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.elecom.co.jp/news/security/20240220-01/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "vultures@jpcert.or.jp", "type": "Primary" } ] }