Improper access control vulnerability in ELECOM routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent unauthenticated attacker to bypass access restriction, and to start the telnet service and execute an arbitrary OS command via unspecified vectors.
References
Link | Resource |
---|---|
https://jvn.jp/en/vu/JVNVU94527926/index.html | Third Party Advisory |
https://www.elecom.co.jp/news/security/20211130-01/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jpcert
Published: 2021-12-01T02:15:59
Updated: 2021-12-01T02:15:59
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-20864
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-12-01T03:15:07.273
Modified: 2022-07-12T17:42:04.277
Link: CVE-2021-20864
JSON object: View
Redhat Information
No data.
CWE