Improper access control vulnerability in ELECOM LAN routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent authenticated attacker to bypass access restriction and to access the management screen of the product via unspecified vectors.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN88993473/index.html | Third Party Advisory |
https://www.elecom.co.jp/news/security/20211130-01/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jpcert
Published: 2021-12-01T02:15:55
Updated: 2021-12-01T02:15:55
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-20861
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-12-01T03:15:07.130
Modified: 2022-06-28T14:11:45.273
Link: CVE-2021-20861
JSON object: View
Redhat Information
No data.
CWE