OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command that is not intended to be executed from the web interface by sending a specially crafted request. Affected products and versions are as follows: ACERA 1320 firmware ver.01.26 and earlier, ACERA 1310 firmware ver.01.26 and earlier, ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, ACERA 1020 firmware ver.01.86 and earlier, ACERA 1010 firmware ver.01.86 and earlier, ACERA 950 firmware ver.01.60 and earlier, ACERA 850F firmware ver.01.60 and earlier, ACERA 900 firmware ver.02.54 and earlier, ACERA 850M firmware ver.02.06 and earlier, ACERA 810 firmware ver.03.74 and earlier, and ACERA 800ST firmware ver.07.35 and earlier. They are affected when running in ST(Standalone) mode.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Furunosystems
Subscribe
|
Acera 1010
Subscribe
Acera 1010 Firmware
Subscribe
Acera 1020
Subscribe
Acera 1020 Firmware
Subscribe
Acera 1110
Subscribe
Acera 1110 Firmware
Subscribe
Acera 1150i
Subscribe
Acera 1150i Firmware
Subscribe
Acera 1150w
Subscribe
Acera 1150w Firmware
Subscribe
Acera 1210
Subscribe
Acera 1210 Firmware
Subscribe
Acera 1310
Subscribe
Acera 1310 Firmware
Subscribe
Acera 1320
Subscribe
Acera 1320 Firmware
Subscribe
Acera 800st
Subscribe
Acera 800st Firmware
Subscribe
Acera 810
Subscribe
Acera 810 Firmware
Subscribe
Acera 850f
Subscribe
Acera 850f Firmware
Subscribe
Acera 850m
Subscribe
Acera 850m Firmware
Subscribe
Acera 900
Subscribe
Acera 900 Firmware
Subscribe
Acera 950
Subscribe
Acera 950 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-42956 | OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command that is not intended to be executed from the web interface by sending a specially crafted request. Affected products and versions are as follows: ACERA 1320 firmware ver.01.26 and earlier, ACERA 1310 firmware ver.01.26 and earlier, ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, ACERA 1020 firmware ver.01.86 and earlier, ACERA 1010 firmware ver.01.86 and earlier, ACERA 950 firmware ver.01.60 and earlier, ACERA 850F firmware ver.01.60 and earlier, ACERA 900 firmware ver.02.54 and earlier, ACERA 850M firmware ver.02.06 and earlier, ACERA 810 firmware ver.03.74 and earlier, and ACERA 800ST firmware ver.07.35 and earlier. They are affected when running in ST(Standalone) mode. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 20 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-09-20T18:33:35.622Z
Reserved: 2023-09-22T04:36:29.779Z
Link: CVE-2023-39222
Updated: 2024-08-02T18:02:06.297Z
Status : Modified
Published: 2023-10-03T01:15:56.810
Modified: 2024-11-21T08:14:56.730
Link: CVE-2023-39222
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD