CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
9.6%
OS command injection vulnerability in WRC-X3000GSN v1.0.2, WRC-X3000GS v1.0.24 and earlier, and WRC-X3000GSA v1.0.24 and earlier allows a network-adjacent attacker with an administrative privilege to execute an arbitrary OS command by sending a specially crafted request to the product.
Vendor | Product | Version | CPE |
---|---|---|---|
elecom | wrc-x3000gsn | - | cpe:2.3:h:elecom:wrc-x3000gsn:-:*:*:*:*:*:*:* |
elecom | wrc-x3000gsn_firmware | 1.0.2 | cpe:2.3:o:elecom:wrc-x3000gsn_firmware:1.0.2:*:*:*:*:*:*:* |
elecom | wrc-x3000gs | - | cpe:2.3:h:elecom:wrc-x3000gs:-:*:*:*:*:*:*:* |
elecom | wrc-x3000gs_firmware | * | cpe:2.3:o:elecom:wrc-x3000gs_firmware:*:*:*:*:*:*:*:* |
elecom | wrc-x3000gsa | - | cpe:2.3:h:elecom:wrc-x3000gsa:-:*:*:*:*:*:*:* |
elecom | wrc-x3000gsa_firmware | * | cpe:2.3:o:elecom:wrc-x3000gsa_firmware:*:*:*:*:*:*:*:* |
[
{
"vendor": "ELECOM CO.,LTD.",
"product": "WRC-X3000GSN",
"versions": [
{
"version": "v1.0.2",
"status": "affected"
}
]
},
{
"vendor": "ELECOM CO.,LTD.",
"product": "WRC-X3000GS",
"versions": [
{
"version": "v1.0.24 and earlier",
"status": "affected"
}
]
},
{
"vendor": "ELECOM CO.,LTD.",
"product": "WRC-X3000GSA",
"versions": [
{
"version": "v1.0.24 and earlier",
"status": "affected"
}
]
}
]