CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
9.4%
OS command injection vulnerability exists in ELECOM wireless LAN routers. A specially crafted request may be sent to the affected product by a logged-in user with an administrative privilege to execute an arbitrary OS command.
Vendor | Product | Version | CPE |
---|---|---|---|
elecom | wrc-x6000xs-g | 1.11 | cpe:2.3:h:elecom:wrc-x6000xs-g:1.11:*:*:*:*:*:*:* |
elecom | wrc-x1500gs-b_firmware | 1.11 | cpe:2.3:o:elecom:wrc-x1500gs-b_firmware:1.11:*:*:*:*:*:*:* |
elecom | wrc-x1500gsa-b_firmware | 1.11 | cpe:2.3:o:elecom:wrc-x1500gsa-b_firmware:1.11:*:*:*:*:*:*:* |
elecom | wrc-x3000gs2-b | 1.08 | cpe:2.3:h:elecom:wrc-x3000gs2-b:1.08:*:*:*:*:*:*:* |
elecom | wrc-x3000gs2-w | 1.08 | cpe:2.3:h:elecom:wrc-x3000gs2-w:1.08:*:*:*:*:*:*:* |
elecom | wrc-x3000gs2a-b | 1.08 | cpe:2.3:h:elecom:wrc-x3000gs2a-b:1.08:*:*:*:*:*:*:* |
[
{
"vendor": "ELECOM CO.,LTD.",
"product": "WRC-X6000XS-G",
"versions": [
{
"version": "v1.11 and earlier",
"status": "affected"
}
]
},
{
"vendor": "ELECOM CO.,LTD.",
"product": "WRC-X1500GS-B",
"versions": [
{
"version": "v1.11 and earlier",
"status": "affected"
}
]
},
{
"vendor": "ELECOM CO.,LTD.",
"product": "WRC-X1500GSA-B",
"versions": [
{
"version": "v1.11 and earlier",
"status": "affected"
}
]
},
{
"vendor": "ELECOM CO.,LTD.",
"product": "WRC-X3000GS2-B",
"versions": [
{
"version": "v1.08 and earlier",
"status": "affected"
}
]
},
{
"vendor": "ELECOM CO.,LTD.",
"product": "WRC-X3000GS2-W",
"versions": [
{
"version": "v1.08 and earlier",
"status": "affected"
}
]
},
{
"vendor": "ELECOM CO.,LTD.",
"product": "WRC-X3000GS2A-B",
"versions": [
{
"version": "v1.08 and earlier",
"status": "affected"
}
]
}
]