// For flags

CVE-2024-22366

 

Severity Score

6.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.

Existe un código de depuración activo en los dispositivos de punto de acceso a LAN inalámbrica de Yamaha. Si un usuario que ha iniciado sesión y sabe cómo utilizar la función de depuración accede a la página de administración del dispositivo, esta función se puede habilitar realizando operaciones específicas. Como resultado, se puede ejecutar un comando arbitrario del sistema operativo y/o se pueden alterar los ajustes de configuración del dispositivo. Los productos y versiones afectados son los siguientes: firmware WLX222 Rev.24.00.03 y anteriores, firmware WLX413 Rev.22.00.05 y anteriores, firmware WLX212 Rev.21.00.12 y anteriores, firmware WLX313 Rev.18.00.12 y anteriores, y WLX202 firmware Rev.16.00.18 y anteriores.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2024-01-09 CVE Reserved
  • 2024-01-24 CVE Published
  • 2024-01-31 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Yamaha
Search vendor "Yamaha"
Wlx222 Firmware
Search vendor "Yamaha" for product "Wlx222 Firmware"
< 24.00.04
Search vendor "Yamaha" for product "Wlx222 Firmware" and version " < 24.00.04"
-
Affected
in Yamaha
Search vendor "Yamaha"
Wlx222
Search vendor "Yamaha" for product "Wlx222"
--
Safe
Yamaha
Search vendor "Yamaha"
Wlx413 Firmware
Search vendor "Yamaha" for product "Wlx413 Firmware"
< 22.00.06
Search vendor "Yamaha" for product "Wlx413 Firmware" and version " < 22.00.06"
-
Affected
in Yamaha
Search vendor "Yamaha"
Wlx413
Search vendor "Yamaha" for product "Wlx413"
--
Safe
Yamaha
Search vendor "Yamaha"
Wlx212 Firmware
Search vendor "Yamaha" for product "Wlx212 Firmware"
< 21.00.13
Search vendor "Yamaha" for product "Wlx212 Firmware" and version " < 21.00.13"
-
Affected
in Yamaha
Search vendor "Yamaha"
Wlx212
Search vendor "Yamaha" for product "Wlx212"
--
Safe
Yamaha
Search vendor "Yamaha"
Wlx313 Firmware
Search vendor "Yamaha" for product "Wlx313 Firmware"
< 18.00.13
Search vendor "Yamaha" for product "Wlx313 Firmware" and version " < 18.00.13"
-
Affected
in Yamaha
Search vendor "Yamaha"
Wlx313
Search vendor "Yamaha" for product "Wlx313"
--
Safe
Yamaha
Search vendor "Yamaha"
Wlx202 Firmware
Search vendor "Yamaha" for product "Wlx202 Firmware"
< 16.00.19
Search vendor "Yamaha" for product "Wlx202 Firmware" and version " < 16.00.19"
-
Affected
in Yamaha
Search vendor "Yamaha"
Wlx202
Search vendor "Yamaha" for product "Wlx202"
--
Safe