OS command injection vulnerability in ELECOM wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request.
OS command injection vulnerability in ELECOM wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request.
| Vendor | Product | Versions |
|---|---|---|
| ELECOM CO.,LTD. | WAB | S600-PS — all versions |
| ELECOM CO.,LTD. | WAB | S300 — all versions |
| ELECOM CO.,LTD. | WAB | S1775 — v1.1.9 and earlier |
| ELECOM CO.,LTD. | WAB | M1775-PS — v1.1.21 and earlier |
| ELECOM CO.,LTD. | WAB | S1167 — v1.0.7 and earlier |
| ELECOM CO.,LTD. | WAB | M2133 — v1.3.22 and earlier |
| ELECOM CO.,LTD. | WAB | I1750-PS — v1.5.10 and earlier |
| ELECOM CO.,LTD. | WAB | S1167-PS — v1.5.6 and earlier |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.