SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-32914 SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
Fixes

Solution

The product is no longer in surport. Please retire affected device.


Workaround

No workaround given by the vendor.

History

Fri, 18 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Secom
Secom wrtr-304gn-304tw-upsc Firmware
CPEs cpe:2.3:o:secom:wrtr-304gn-304tw-upsc_firmware:*:*:*:*:*:*:*:*
Vendors & Products Secom
Secom wrtr-304gn-304tw-upsc Firmware
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 18 Oct 2024 04:15:00 +0000

Type Values Removed Values Added
Description SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
Title SECOM WRTR-304GN-304TW-UPSC - OS Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-10-18T16:46:48.733Z

Reserved: 2024-10-18T02:54:42.209Z

Link: CVE-2024-10118

cve-icon Vulnrichment

Updated: 2024-10-18T16:46:42.732Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-18T04:15:03.290

Modified: 2024-10-18T12:52:33.507

Link: CVE-2024-10118

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.