Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.
References
Link | Resource |
---|---|
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html | Vendor Advisory |
https://jvn.jp/en/vu/JVNVU99896362/ | Third Party Advisory |
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html | Vendor Advisory |
https://jvn.jp/en/vu/JVNVU99896362/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 08:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html - Vendor Advisory | |
References | () https://jvn.jp/en/vu/JVNVU99896362/ - Third Party Advisory |
30 Jan 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
First Time |
Yamaha wlx212
Yamaha wlx413 Firmware Yamaha wlx313 Yamaha wlx202 Yamaha wlx222 Yamaha wlx212 Firmware Yamaha wlx202 Firmware Yamaha wlx413 Yamaha wlx222 Firmware Yamaha wlx313 Firmware Yamaha |
|
References | () https://jvn.jp/en/vu/JVNVU99896362/ - Third Party Advisory | |
References | () http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html - Vendor Advisory | |
CPE | cpe:2.3:o:yamaha:wlx212_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:yamaha:wlx413:-:*:*:*:*:*:*:* cpe:2.3:o:yamaha:wlx313_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:yamaha:wlx222_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:yamaha:wlx202_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:yamaha:wlx202:-:*:*:*:*:*:*:* cpe:2.3:h:yamaha:wlx212:-:*:*:*:*:*:*:* cpe:2.3:o:yamaha:wlx413_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:yamaha:wlx313:-:*:*:*:*:*:*:* cpe:2.3:h:yamaha:wlx222:-:*:*:*:*:*:*:* |
|
CWE | CWE-78 |
24 Jan 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-24 05:15
Updated : 2024-11-21 08:56
NVD link : CVE-2024-22366
Mitre link : CVE-2024-22366
CVE.ORG link : CVE-2024-22366
JSON object : View
Products Affected
yamaha
- wlx413_firmware
- wlx413
- wlx212_firmware
- wlx202_firmware
- wlx313
- wlx222
- wlx313_firmware
- wlx222_firmware
- wlx212
- wlx202
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')