SARA / Free Tools / CVE / CVE-2023-39222

CVE-2023-39222 — OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point d

OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command that is not intended to be executed from the web interface by sending a specially crafted request. Affected products and versions

CVSS
EPSS
80.00% (top 26.20%)
CWE
Published
2023-10-03T00:12:04.706Z
Last modified
2024-09-20T18:33:35.622Z
CVSS vector

01What is this vulnerability?

OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command that is not intended to be executed from the web interface by sending a specially crafted request. Affected products and versions are as follows: ACERA 1320 firmware ver.01.26 and earlier, ACERA 1310 firmware ver.01.26 and earlier, ACERA 1210…

02Affected products

VendorProductVersions
FURUNO SYSTEMS Co.,Ltd.ACERA 1320firmware ver.01.26 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 1310firmware ver.01.26 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 1210firmware ver.02.36 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 1150ifirmware ver.01.35 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 1150wfirmware ver.01.35 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 1110firmware ver.01.76 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 1020firmware ver.01.86 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 1010firmware ver.01.86 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 950firmware ver.01.60 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 850Ffirmware ver.01.60 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 900firmware ver.02.54 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 850Mfirmware ver.02.06 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 810firmware ver.03.74 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 800STfirmware ver.07.35 and earlier

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →