Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:elecom:wrc-1167gs2-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "562FC1F4-4B24-427E-981F-FABA8C270E24", "versionEndExcluding": "1.73", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:elecom:wrc-1167gs2-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C37403-F848-4FD4-9AC3-FED5BF871163", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:elecom:wrc-1167gs2h-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4044F887-CB21-49E5-A6F5-E8D6FF13E757", "versionEndExcluding": "1.73", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:elecom:wrc-1167gs2h-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9E9EB42-AFE2-44DB-83A3-A9E74BB9A010", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "185BD8AF-8C0C-4528-9CF3-6C6FC7869C0E", "versionEndExcluding": "1.34", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9045F74-985E-4C3C-AC10-14FD9B61A746", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAE30FA6-A244-4781-9397-7A56E74B7FF8", "versionEndExcluding": "1.68", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9FF3CB7-7F2E-472A-A2A3-ED599F4FC99C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A6660BB-9A29-4C6E-8E6C-9AAD663669A7", "versionEndExcluding": "1.68", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0FE-1232-4C39-AA86-2D616E4D39C6", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:elecom:wrc-2533gs2v-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EAD43E5-BC22-4008-BA9B-97DD6F3344D4", "versionEndExcluding": "1.68", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:elecom:wrc-2533gs2v-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "69FF2911-A946-4E48-B50A-F1F5EC95BBCC", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A42CBC3B-C096-4622-8072-3CE279FBA4A0", "versionEndExcluding": "1.31", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*", "matchCriteriaId": "85BF0A23-43C9-4497-BDDF-9366642503ED", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:elecom:wrc-x3200gst3-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82307DBF-148B-4D72-8BB2-1574068A3E4E", "versionEndExcluding": "1.27", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:elecom:wrc-x3200gst3-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DF4AD14-A9E3-4797-A201-BBE34BBCEDD3", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:elecom:wrc-g01-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "09D59756-26E6-4FFE-8C4C-09904BE42A7E", "versionEndExcluding": "1.26", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:elecom:wrc-g01-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFAFF4E-7884-455C-AE6D-B5600C0EEA73", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:elecom:wmc-x1800gst-b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "864689A8-CA48-466F-B675-47F777F948AC", "versionEndExcluding": "1.42", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:elecom:wmc-x1800gst-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "40476229-3AC2-4A0F-BCC4-A170879441F9", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit \"WMC-2LX-B\"."}, {"lang": "es", "value": "Los enrutadores de LAN inal\u00e1mbrica ELECOM contienen una vulnerabilidad de cross-site scripting. Supongamos que un usuario administrativo malintencionado configura el producto afectado con contenido especialmente manipulado. Cuando otro usuario administrativo inicia sesi\u00f3n y opera el producto, se puede ejecutar un script arbitrario en el navegador web. Los productos y versiones afectados son los siguientes: WRC-1167GS2-B v1.67 y anteriores, WRC-1167GS2H-B v1.67 y anteriores, WRC-2533GS2-B v1.62 y anteriores, WRC-2533GS2-W v1.62 y anteriores y WRC-2533GS2V-B v1.62 y anteriores."}], "id": "CVE-2024-21798", "lastModified": "2025-02-14T15:32:23.757", "metrics": {"cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0"}, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "vultures@jpcert.or.jp", "type": "Secondary"}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2024-02-28T23:15:09.453", "references": [{"source": "vultures@jpcert.or.jp", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/en/jp/JVN44166658/"}, {"source": "vultures@jpcert.or.jp", "tags": ["Vendor Advisory"], "url": "https://www.elecom.co.jp/news/security/20240220-01/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/en/jp/JVN44166658/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.elecom.co.jp/news/security/20240220-01/"}], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "vultures@jpcert.or.jp", "type": "Primary"}]}