OS command injection vulnerability in ELECOM wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request.
History

Thu, 03 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Sep 2024 07:00:00 +0000

Type Values Removed Values Added
Description OS command injection vulnerability in ELECOM network devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WAB-S600-PS all versions, WAB-S300 all versions, WAB-M1775-PS v1.1.21 and earlier, WAB-S1775 v1.1.9 and earlier, WAB-S1167 v1.0.7 and earlier, and WAB-M2133 v1.3.22 and earlier. OS command injection vulnerability in ELECOM wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request.

cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published: 2023-08-18T09:45:31.201Z

Updated: 2025-07-03T14:01:25.610Z

Reserved: 2023-08-09T11:54:59.361Z

Link: CVE-2023-40072

cve-icon Vulnrichment

Updated: 2024-08-02T18:24:55.046Z

cve-icon NVD

Status : Modified

Published: 2023-08-18T10:15:12.847

Modified: 2025-07-03T14:15:25.430

Link: CVE-2023-40072

cve-icon Redhat

No data.