SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
Metrics
Affected Vendors & Products
References
History
Fri, 18 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Secom
Secom wrtr-304gn-304tw-upsc Firmware |
|
CPEs | cpe:2.3:o:secom:wrtr-304gn-304tw-upsc_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Secom
Secom wrtr-304gn-304tw-upsc Firmware |
|
Metrics |
ssvc
|
Fri, 18 Oct 2024 04:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. | |
Title | SECOM WRTR-304GN-304TW-UPSC - OS Command Injection | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: twcert
Published: 2024-10-18T04:03:58.106Z
Updated: 2024-10-18T16:46:48.733Z
Reserved: 2024-10-18T02:54:42.209Z
Link: CVE-2024-10118
Vulnrichment
Updated: 2024-10-18T16:46:42.732Z
NVD
Status : Awaiting Analysis
Published: 2024-10-18T04:15:03.290
Modified: 2024-10-18T12:52:33.507
Link: CVE-2024-10118
Redhat
No data.