Show filters
102 Total Results
Displaying 21-30 of 102
Sort by:
Attacker Value
Unknown

CVE-2024-4225

Disclosure Date: April 30, 2024 (last updated April 30, 2024)
Multiple security vulnerabilities has been discovered in web interface of NetGuardian DIN Remote Telemetry Unit (RTU), by DPS Telecom. Attackers can exploit those security vulnerabilities to perform critical actions such as escalate user's privilege, steal user's credential, Cross Site Scripting (XSS) and Cross-Site Request Forgery (CSRF).
0
Attacker Value
Unknown

CVE-2024-29225

Disclosure Date: April 04, 2024 (last updated April 10, 2024)
WRC-X3200GST3-B v1.25 and earlier, and WRC-G01-W v1.24 and earlier allow a network-adjacent unauthenticated attacker to obtain the configuration file containing sensitive information by sending a specially crafted request.
0
Attacker Value
Unknown

CVE-2024-26258

Disclosure Date: April 04, 2024 (last updated November 26, 2024)
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with credentials to execute arbitrary OS commands by sending a specially crafted request to the product.
0
Attacker Value
Unknown

CVE-2024-25568

Disclosure Date: April 04, 2024 (last updated June 12, 2024)
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent unauthenticated attacker to execute arbitrary OS commands by sending a specially crafted request to the product. Affected products and versions are as follows: WRC-X3200GST3-B v1.25 and earlier, WRC-G01-W v1.24 and earlier, and WMC-X1800GST-B v1.41 and earlier. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
0
Attacker Value
Unknown

CVE-2024-25579

Disclosure Date: February 28, 2024 (last updated November 26, 2024)
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
0
Attacker Value
Unknown

CVE-2024-23910

Disclosure Date: February 28, 2024 (last updated February 15, 2025)
Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B".
Attacker Value
Unknown

CVE-2024-21798

Disclosure Date: February 28, 2024 (last updated February 15, 2025)
ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
Attacker Value
Unknown

CVE-2024-22372

Disclosure Date: January 24, 2024 (last updated September 09, 2024)
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product.
Attacker Value
Unknown

CVE-2023-49695

Disclosure Date: December 12, 2023 (last updated December 16, 2023)
OS command injection vulnerability in WRC-X3000GSN v1.0.2, WRC-X3000GS v1.0.24 and earlier, and WRC-X3000GSA v1.0.24 and earlier allows a network-adjacent attacker with an administrative privilege to execute an arbitrary OS command by sending a specially crafted request to the product.
Attacker Value
Unknown

CVE-2023-43757

Disclosure Date: November 16, 2023 (last updated December 02, 2023)
Inadequate encryption strength vulnerability in multiple routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION allows a network-adjacent unauthenticated attacker to guess the encryption key used for wireless LAN communication and intercept the communication. As for the affected products/versions, see the information provided by the vendor under [References] section.