CVE-2022-26834

Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 allows a remote attacker to obtain the information stored in the product because the product is set to accept HTTP connections from the WAN side by default.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rakuten:casa:ap_f_v1_4_1:*:*:*:*:*:*:*
cpe:2.3:a:rakuten:casa:ap_f_v2_0_0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:54

Type Values Removed Values Added
References () https://jvn.jp/en/jp/JVN46892984/index.html - Third Party Advisory, VDB Entry () https://jvn.jp/en/jp/JVN46892984/index.html - Third Party Advisory, VDB Entry
References () https://network.mobile.rakuten.co.jp/information/news/product/1033/ - Vendor Advisory () https://network.mobile.rakuten.co.jp/information/news/product/1033/ - Vendor Advisory

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-863 NVD-CWE-Other

Information

Published : 2022-06-13 05:15

Updated : 2024-11-21 06:54


NVD link : CVE-2022-26834

Mitre link : CVE-2022-26834

CVE.ORG link : CVE-2022-26834


JSON object : View

Products Affected

rakuten

  • casa