OS command injection vulnerability in ELECOM routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent authenticated attackers to execute an arbitrary OS command with the root privilege via unspecified vectors.
References
Link | Resource |
---|---|
https://jvn.jp/en/vu/JVNVU94527926/index.html | Third Party Advisory |
https://www.elecom.co.jp/news/security/20211130-01/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jpcert
Published: 2021-12-01T02:15:58
Updated: 2021-12-01T02:15:58
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-20863
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-12-01T03:15:07.223
Modified: 2021-12-02T16:35:06.923
Link: CVE-2021-20863
JSON object: View
Redhat Information
No data.
CWE