CVE-2024-22366

Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:yamaha:wlx222_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:yamaha:wlx222:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:yamaha:wlx413_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:yamaha:wlx413:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:yamaha:wlx212_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:yamaha:wlx212:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:yamaha:wlx313_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:yamaha:wlx313:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:yamaha:wlx202_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:yamaha:wlx202:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:56

Type Values Removed Values Added
References () http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html - Vendor Advisory () http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html - Vendor Advisory
References () https://jvn.jp/en/vu/JVNVU99896362/ - Third Party Advisory () https://jvn.jp/en/vu/JVNVU99896362/ - Third Party Advisory

30 Jan 2024, 22:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
First Time Yamaha wlx212
Yamaha wlx413 Firmware
Yamaha wlx313
Yamaha wlx202
Yamaha wlx222
Yamaha wlx212 Firmware
Yamaha wlx202 Firmware
Yamaha wlx413
Yamaha wlx222 Firmware
Yamaha wlx313 Firmware
Yamaha
References () https://jvn.jp/en/vu/JVNVU99896362/ - () https://jvn.jp/en/vu/JVNVU99896362/ - Third Party Advisory
References () http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html - () http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html - Vendor Advisory
CPE cpe:2.3:o:yamaha:wlx212_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:yamaha:wlx413:-:*:*:*:*:*:*:*
cpe:2.3:o:yamaha:wlx313_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:yamaha:wlx222_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:yamaha:wlx202_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:yamaha:wlx202:-:*:*:*:*:*:*:*
cpe:2.3:h:yamaha:wlx212:-:*:*:*:*:*:*:*
cpe:2.3:o:yamaha:wlx413_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:yamaha:wlx313:-:*:*:*:*:*:*:*
cpe:2.3:h:yamaha:wlx222:-:*:*:*:*:*:*:*
CWE CWE-78

24 Jan 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-24 05:15

Updated : 2024-11-21 08:56


NVD link : CVE-2024-22366

Mitre link : CVE-2024-22366

CVE.ORG link : CVE-2024-22366


JSON object : View

Products Affected

yamaha

  • wlx413_firmware
  • wlx413
  • wlx212_firmware
  • wlx202_firmware
  • wlx313
  • wlx222
  • wlx313_firmware
  • wlx222_firmware
  • wlx212
  • wlx202
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')