The wireless router WRTM326 from SECOM does not properly validate a specific parameter. An unauthenticated remote attacker could execute arbitrary system commands by sending crafted requests.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-32915 The wireless router WRTM326 from SECOM does not properly validate a specific parameter. An unauthenticated remote attacker could execute arbitrary system commands by sending crafted requests.
Fixes

Solution

Update WRTM326 to version 2.3.20 or later.


Workaround

No workaround given by the vendor.

History

Fri, 01 Nov 2024 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Zte
Zte wrtm326
Zte wrtm326 Firmware
CPEs cpe:2.3:h:zte:wrtm326:-:*:*:*:*:*:*:*
cpe:2.3:o:zte:wrtm326_firmware:*:*:*:*:*:*:*:*
Vendors & Products Zte
Zte wrtm326
Zte wrtm326 Firmware

Fri, 18 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Secom
Secom wrtm326 Firmware
CPEs cpe:2.3:o:secom:wrtm326_firmware:*:*:*:*:*:*:*:*
Vendors & Products Secom
Secom wrtm326 Firmware
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 18 Oct 2024 04:30:00 +0000

Type Values Removed Values Added
Description The wireless router WRTM326 from SECOM does not properly validate a specific parameter. An unauthenticated remote attacker could execute arbitrary system commands by sending crafted requests.
Title SECOM WRTM326 - OS Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-10-18T16:41:22.656Z

Reserved: 2024-10-18T02:54:43.842Z

Link: CVE-2024-10119

cve-icon Vulnrichment

Updated: 2024-10-18T16:41:17.779Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-18T05:15:05.200

Modified: 2024-11-01T18:40:58.367

Link: CVE-2024-10119

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.