Lucene search

K
cvelistJpcertCVELIST:CVE-2024-22366
HistoryJan 24, 2024 - 4:35 a.m.

CVE-2024-22366

2024-01-2404:35:55
jpcert
www.cve.org
1
yamaha
wlan
access points
debug code
arbitrary os command
configuration alteration
security vulnerability
firmware

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.8%

Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device’s management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.

CNA Affected

[
  {
    "vendor": "Yamaha Corporation",
    "product": "WLX222",
    "versions": [
      {
        "version": "firmware Rev.24.00.03 and earlier",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Yamaha Corporation",
    "product": "WLX413",
    "versions": [
      {
        "version": "firmware Rev.22.00.05 and earlier",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Yamaha Corporation",
    "product": "WLX212",
    "versions": [
      {
        "version": "firmware Rev.21.00.12 and earlier",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Yamaha Corporation",
    "product": "WLX313",
    "versions": [
      {
        "version": "firmware Rev.18.00.12 and earlier",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Yamaha Corporation",
    "product": "WLX202",
    "versions": [
      {
        "version": "firmware Rev.16.00.18 and earlier",
        "status": "affected"
      }
    ]
  }
]

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.8%

Related for CVELIST:CVE-2024-22366