Vulnerabilites related to elecom - wrc-x3000gs2-w
cve-2024-34577
Vulnerability from cvelistv5
Published
2024-08-30 06:29
Modified
2024-08-30 14:24
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability exists in WRC-X3000GS2-B, WRC-X3000GS2-W, and WRC-X3000GS2A-B due to improper processing of input values in easysetup.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ELECOM CO.,LTD. | WRC-X3000GS2-B |
Version: v1.08 and earlier |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-34577", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-30T14:24:29.112981Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-30T14:24:50.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WRC-X3000GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] }, { "product": "WRC-X3000GS2A-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.08 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in WRC-X3000GS2-B, WRC-X3000GS2-W, and WRC-X3000GS2A-B due to improper processing of input values in easysetup.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user\u0027s web browser." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-30T06:29:32.671Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20240827-01/" }, { "url": "https://jvn.jp/en/jp/JVN24885537/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-34577", "datePublished": "2024-08-30T06:29:32.671Z", "dateReserved": "2024-08-16T04:42:10.924Z", "dateUpdated": "2024-08-30T14:24:50.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-43752
Vulnerability from cvelistv5
Published
2023-11-16 06:46
Modified
2024-08-02 19:52
Severity ?
EPSS score ?
Summary
OS command injection vulnerability in WRC-X3000GS2-W v1.05 and earlier, WRC-X3000GS2-B v1.05 and earlier, and WRC-X3000GS2A-B v1.05 and earlier allows a network-adjacent authenticated user to execute an arbitrary OS command by sending a specially crafted request.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ELECOM CO.,LTD. | WRC-X3000GS2-W |
Version: v1.05 and earlier |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:52:11.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20231114-01/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU94119876/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WRC-X3000GS2-W", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.05 and earlier" } ] }, { "product": "WRC-X3000GS2-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.05 and earlier" } ] }, { "product": "WRC-X3000GS2A-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.05 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability in WRC-X3000GS2-W v1.05 and earlier, WRC-X3000GS2-B v1.05 and earlier, and WRC-X3000GS2A-B v1.05 and earlier allows a network-adjacent authenticated user to execute an arbitrary OS command by sending a specially crafted request." } ], "problemTypes": [ { "descriptions": [ { "description": "OS command injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-16T06:46:38.102Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20231114-01/" }, { "url": "https://jvn.jp/en/vu/JVNVU94119876/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-43752", "datePublished": "2023-11-16T06:46:38.102Z", "dateReserved": "2023-10-31T07:10:42.739Z", "dateUpdated": "2024-08-02T19:52:11.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-11-16 07:15
Modified
2024-11-21 08:24
Severity ?
Summary
OS command injection vulnerability in WRC-X3000GS2-W v1.05 and earlier, WRC-X3000GS2-B v1.05 and earlier, and WRC-X3000GS2A-B v1.05 and earlier allows a network-adjacent authenticated user to execute an arbitrary OS command by sending a specially crafted request.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/vu/JVNVU94119876/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.elecom.co.jp/news/security/20231114-01/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/vu/JVNVU94119876/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.elecom.co.jp/news/security/20231114-01/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
elecom | wrc-x3000gs2-w_firmware | * | |
elecom | wrc-x3000gs2-w | - | |
elecom | wrc-x3000gs2-b_firmware | * | |
elecom | wrc-x3000gs2-b | - | |
elecom | wrc-x3000gs2a-b_firmware | * | |
elecom | wrc-x3000gs2a-b | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-x3000gs2-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21390E4B-D326-4E5E-B172-96F0BA0892B0", "versionEndIncluding": "1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-x3000gs2-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "70A7409C-3E07-4A7B-8248-F2090A74448B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-x3000gs2-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10F9ECA1-A641-48C0-9E1A-F9735C89B829", "versionEndIncluding": "1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-x3000gs2-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D748C9E-0B14-404C-A0D7-4DD1DDF35C11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-x3000gs2a-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6167B6D-10FB-4717-9A45-57C3FC71403D", "versionEndIncluding": "1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-x3000gs2a-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC2AA9-297E-4FAC-B64D-64A06ED4ED1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability in WRC-X3000GS2-W v1.05 and earlier, WRC-X3000GS2-B v1.05 and earlier, and WRC-X3000GS2A-B v1.05 and earlier allows a network-adjacent authenticated user to execute an arbitrary OS command by sending a specially crafted request." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en WRC-X3000GS2-W v1.05 y anteriores, WRC-X3000GS2-B v1.05 y anteriores, y WRC-X3000GS2A-B v1.05 y anteriores permite que un usuario autenticado adyacente a la red ejecute un sistema operativo arbitrario comando enviando una solicitud especialmente manipulada." } ], "id": "CVE-2023-43752", "lastModified": "2024-11-21T08:24:43.067", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-16T07:15:07.203", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU94119876/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.elecom.co.jp/news/security/20231114-01/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU94119876/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.elecom.co.jp/news/security/20231114-01/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-30 07:15
Modified
2024-09-03 14:59
Severity ?
Summary
Cross-site scripting vulnerability exists in WRC-X3000GS2-B, WRC-X3000GS2-W, and WRC-X3000GS2A-B due to improper processing of input values in easysetup.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN24885537/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.elecom.co.jp/news/security/20240827-01/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
elecom | wrc-x3000gs2-b_firmware | * | |
elecom | wrc-x3000gs2-b | - | |
elecom | wrc-x3000gs2-w_firmware | * | |
elecom | wrc-x3000gs2-w | - | |
elecom | wrc-x3000gs2a-b_firmware | * | |
elecom | wrc-x3000gs2a-b | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-x3000gs2-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D125A4ED-8AB6-4A49-A806-A9FC65455669", "versionEndIncluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-x3000gs2-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D748C9E-0B14-404C-A0D7-4DD1DDF35C11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-x3000gs2-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1D0B1E8-3E29-40F0-8E71-CC7B89BF8572", "versionEndIncluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-x3000gs2-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "70A7409C-3E07-4A7B-8248-F2090A74448B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-x3000gs2a-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "09A8CB6C-57A5-4B67-A128-4ACCEDB19B85", "versionEndIncluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-x3000gs2a-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC2AA9-297E-4FAC-B64D-64A06ED4ED1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in WRC-X3000GS2-B, WRC-X3000GS2-W, and WRC-X3000GS2A-B due to improper processing of input values in easysetup.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user\u0027s web browser." }, { "lang": "es", "value": "Existe una vulnerabilidad de Cross Site Scripting en WRC-X3000GS2-B, WRC-X3000GS2-W y WRC-X3000GS2A-B debido al procesamiento incorrecto de los valores de entrada en easysetup.cgi. Si un usuario visualiza una p\u00e1gina web maliciosa mientras est\u00e1 conectado al producto, es posible que se ejecute una secuencia de comandos arbitraria en el navegador web del usuario." } ], "id": "CVE-2024-34577", "lastModified": "2024-09-03T14:59:01.767", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-30T07:15:11.660", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN24885537/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.elecom.co.jp/news/security/20240827-01/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }