SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
History

Fri, 18 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Secom
Secom wrtr-304gn-304tw-upsc Firmware
CPEs cpe:2.3:o:secom:wrtr-304gn-304tw-upsc_firmware:*:*:*:*:*:*:*:*
Vendors & Products Secom
Secom wrtr-304gn-304tw-upsc Firmware
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 18 Oct 2024 04:15:00 +0000

Type Values Removed Values Added
Description SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
Title SECOM WRTR-304GN-304TW-UPSC - OS Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published: 2024-10-18T04:03:58.106Z

Updated: 2024-10-18T16:46:48.733Z

Reserved: 2024-10-18T02:54:42.209Z

Link: CVE-2024-10118

cve-icon Vulnrichment

Updated: 2024-10-18T16:46:42.732Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-18T04:15:03.290

Modified: 2024-10-18T12:52:33.507

Link: CVE-2024-10118

cve-icon Redhat

No data.