CVE-2023-31198

OS command injection vulnerability exists in Wi-Fi AP UNIT allows. If this vulnerability is exploited, a remote authenticated attacker with an administrative privilege to execute an arbitrary OS command. Affected products and versions are as follows: AC-PD-WAPU v1.05_B04 and earlier, AC-PD-WAPUM v1.05_B04 and earlier, AC-PD-WAPU-P v1.05_B04P and earlier, AC-PD-WAPUM-P v1.05_B04P and earlier, AC-WAPU-300 v1.00_B07 and earlier, AC-WAPUM-300 v1.00_B07 and earlier, AC-WAPU-300-P v1.00_B07 and earlier, and AC-WAPUM-300-P v1.00_B07 and earlier
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:inaba:ac-pd-wapu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-pd-wapu:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:inaba:ac-pd-wapum_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-pd-wapum:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:inaba:ac-pd-wapu-p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-pd-wapu-p:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:inaba:ac-pd-wapum-p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-pd-wapum-p:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:inaba:ac-wapu-300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-wapu-300:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:inaba:ac-wapum-300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-wapum-300:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:inaba:ac-wapum-300-p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-wapum-300-p:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:inaba:ac-wapu-300-p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-wapu-300-p:-:*:*:*:*:*:*:*

History

22 Jun 2023, 00:46

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CWE CWE-78
References (MISC) https://jvn.jp/en/jp/JVN28412757/ - (MISC) https://jvn.jp/en/jp/JVN28412757/ - Mitigation, Third Party Advisory
References (MISC) https://www.inaba.co.jp/abaniact/news/Wi-Fi_AP_UNIT%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8B%E8%A4%87%E6%95%B0%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6.pdf - (MISC) https://www.inaba.co.jp/abaniact/news/Wi-Fi_AP_UNIT%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8B%E8%A4%87%E6%95%B0%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6.pdf - Vendor Advisory
CPE cpe:2.3:h:inaba:ac-pd-wapum:-:*:*:*:*:*:*:*
cpe:2.3:o:inaba:ac-wapu-300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-wapu-300:-:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-wapum-300-p:-:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-pd-wapu-p:-:*:*:*:*:*:*:*
cpe:2.3:o:inaba:ac-pd-wapu-p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:inaba:ac-wapum-300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:inaba:ac-pd-wapum-p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:inaba:ac-pd-wapu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-wapu-300-p:-:*:*:*:*:*:*:*
cpe:2.3:o:inaba:ac-wapu-300-p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-pd-wapu:-:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-pd-wapum-p:-:*:*:*:*:*:*:*
cpe:2.3:h:inaba:ac-wapum-300:-:*:*:*:*:*:*:*
cpe:2.3:o:inaba:ac-wapum-300-p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:inaba:ac-pd-wapum_firmware:*:*:*:*:*:*:*:*
First Time Inaba ac-pd-wapum-p Firmware
Inaba ac-pd-wapu-p Firmware
Inaba ac-pd-wapu-p
Inaba
Inaba ac-wapu-300
Inaba ac-wapu-300 Firmware
Inaba ac-wapu-300-p
Inaba ac-wapum-300-p
Inaba ac-pd-wapu Firmware
Inaba ac-wapum-300-p Firmware
Inaba ac-wapum-300
Inaba ac-pd-wapum Firmware
Inaba ac-pd-wapu
Inaba ac-wapu-300-p Firmware
Inaba ac-pd-wapum
Inaba ac-pd-wapum-p
Inaba ac-wapum-300 Firmware

13 Jun 2023, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-13 10:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-31198

Mitre link : CVE-2023-31198

CVE.ORG link : CVE-2023-31198


JSON object : View

Products Affected

inaba

  • ac-pd-wapum_firmware
  • ac-pd-wapum-p_firmware
  • ac-wapum-300
  • ac-pd-wapum-p
  • ac-pd-wapu-p_firmware
  • ac-wapu-300
  • ac-wapum-300_firmware
  • ac-wapu-300-p_firmware
  • ac-pd-wapu_firmware
  • ac-wapu-300_firmware
  • ac-wapu-300-p
  • ac-pd-wapum
  • ac-pd-wapu-p
  • ac-wapum-300-p
  • ac-pd-wapu
  • ac-wapum-300-p_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')