SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
Metrics
Affected Vendors & Products
References
History
Fri, 18 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Secom
Secom wrtr-304gn-304tw-upsc Firmware |
|
CPEs | cpe:2.3:o:secom:wrtr-304gn-304tw-upsc_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Secom
Secom wrtr-304gn-304tw-upsc Firmware |
|
Metrics |
ssvc
|
Fri, 18 Oct 2024 04:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. | |
Title | SECOM WRTR-304GN-304TW-UPSC - OS Command Injection | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-10-18T16:46:48.733Z
Reserved: 2024-10-18T02:54:42.209Z
Link: CVE-2024-10118

Updated: 2024-10-18T16:46:42.732Z

Status : Awaiting Analysis
Published: 2024-10-18T04:15:03.290
Modified: 2024-10-18T12:52:33.507
Link: CVE-2024-10118

No data.