NA

CVE-2023-39222

Published: 03/10/2023 Updated: 04/10/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command that is not intended to be executed from the web interface by sending a specially crafted request. Affected products and versions are as follows: ACERA 1320 firmware ver.01.26 and previous versions, ACERA 1310 firmware ver.01.26 and previous versions, ACERA 1210 firmware ver.02.36 and previous versions, ACERA 1150i firmware ver.01.35 and previous versions, ACERA 1150w firmware ver.01.35 and previous versions, ACERA 1110 firmware ver.01.76 and previous versions, ACERA 1020 firmware ver.01.86 and previous versions, ACERA 1010 firmware ver.01.86 and previous versions, ACERA 950 firmware ver.01.60 and previous versions, ACERA 850F firmware ver.01.60 and previous versions, ACERA 900 firmware ver.02.54 and previous versions, ACERA 850M firmware ver.02.06 and previous versions, ACERA 810 firmware ver.03.74 and previous versions, and ACERA 800ST firmware ver.07.35 and previous versions. They are affected when running in ST(Standalone) mode.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

furunosystems acera_1310_firmware

furunosystems acera_1320_firmware

furunosystems acera_1210_firmware

furunosystems acera_1150i_firmware

furunosystems acera_1150w_firmware

furunosystems acera_1110_firmware

furunosystems acera_1020_firmware

furunosystems acera_1010_firmware

furunosystems acera_950_firmware

furunosystems acera_850f_firmware

furunosystems acera_900_firmware

furunosystems acera_850m_firmware

furunosystems acera_810_firmware

furunosystems acera_800st_firmware