Description
Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.
Published: 2024-01-24
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Yamaha Wlx202 Wlx202 Firmware Wlx212 Wlx212 Firmware Wlx222 Wlx222 Firmware Wlx313 Wlx313 Firmware Wlx413 Wlx413 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2025-06-20T19:27:11.652Z

Reserved: 2024-01-09T07:04:26.494Z

Link: CVE-2024-22366

cve-icon Vulnrichment

Updated: 2024-08-01T22:43:34.585Z

cve-icon NVD

Status : Modified

Published: 2024-01-24T05:15:13.823

Modified: 2025-06-20T20:15:28.973

Link: CVE-2024-22366

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses