SARA / Free Tools / CVE / CVE-2023-39429

CVE-2023-39429 — Cross-site scripting vulnerability in FURUNO SYSTEMS wireless LAN access point d

Cross-site scripting vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to inject an arbitrary script via a crafted configuration. Affected products and versions are as follows: ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i fir

CVSS
EPSS
31.00% (top 46.20%)
CWE
Published
2023-10-03T00:14:18.187Z
Last modified
2024-09-20T18:32:39.836Z
CVSS vector

01What is this vulnerability?

Cross-site scripting vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to inject an arbitrary script via a crafted configuration. Affected products and versions are as follows: ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier…

02Affected products

VendorProductVersions
FURUNO SYSTEMS Co.,Ltd.ACERA 1210firmware ver.02.36 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 1150ifirmware ver.01.35 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 1150wfirmware ver.01.35 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 1110firmware ver.01.76 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 1020firmware ver.01.86 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 1010firmware ver.01.86 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 950firmware ver.01.60 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 850Ffirmware ver.01.60 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 900firmware ver.02.54 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 850Mfirmware ver.02.06 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 810firmware ver.03.74 and earlier
FURUNO SYSTEMS Co.,Ltd.ACERA 800STfirmware ver.07.35 and earlier

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →