NA

CVE-2024-22366

Published: 24/01/2024 Updated: 30/01/2024
CVSS v3 Base Score: 6.8 | Impact Score: 5.9 | Exploitability Score: 0.9
VMScore: 0

Vulnerability Summary

Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and previous versions, WLX413 firmware Rev.22.00.05 and previous versions, WLX212 firmware Rev.21.00.12 and previous versions, WLX313 firmware Rev.18.00.12 and previous versions, and WLX202 firmware Rev.16.00.18 and previous versions.

Vulnerable Product Search on Vulmon Subscribe to Product

yamaha wlx222_firmware

yamaha wlx413_firmware

yamaha wlx212_firmware

yamaha wlx313_firmware

yamaha wlx202_firmware