OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command that is not intended to be executed from the web interface by sending a specially crafted request. Affected products and versions
OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command that is not intended to be executed from the web interface by sending a specially crafted request. Affected products and versions are as follows: ACERA 1320 firmware ver.01.26 and earlier, ACERA 1310 firmware ver.01.26 and earlier, ACERA 1210…
| Vendor | Product | Versions |
|---|---|---|
| FURUNO SYSTEMS Co.,Ltd. | ACERA 1320 | firmware ver.01.26 and earlier |
| FURUNO SYSTEMS Co.,Ltd. | ACERA 1310 | firmware ver.01.26 and earlier |
| FURUNO SYSTEMS Co.,Ltd. | ACERA 1210 | firmware ver.02.36 and earlier |
| FURUNO SYSTEMS Co.,Ltd. | ACERA 1150i | firmware ver.01.35 and earlier |
| FURUNO SYSTEMS Co.,Ltd. | ACERA 1150w | firmware ver.01.35 and earlier |
| FURUNO SYSTEMS Co.,Ltd. | ACERA 1110 | firmware ver.01.76 and earlier |
| FURUNO SYSTEMS Co.,Ltd. | ACERA 1020 | firmware ver.01.86 and earlier |
| FURUNO SYSTEMS Co.,Ltd. | ACERA 1010 | firmware ver.01.86 and earlier |
| FURUNO SYSTEMS Co.,Ltd. | ACERA 950 | firmware ver.01.60 and earlier |
| FURUNO SYSTEMS Co.,Ltd. | ACERA 850F | firmware ver.01.60 and earlier |
| FURUNO SYSTEMS Co.,Ltd. | ACERA 900 | firmware ver.02.54 and earlier |
| FURUNO SYSTEMS Co.,Ltd. | ACERA 850M | firmware ver.02.06 and earlier |
| FURUNO SYSTEMS Co.,Ltd. | ACERA 810 | firmware ver.03.74 and earlier |
| FURUNO SYSTEMS Co.,Ltd. | ACERA 800ST | firmware ver.07.35 and earlier |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.