Improper access control vulnerability in ELECOM LAN routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent authenticated attacker to bypass access restriction and to access the management screen of the product via unspecified vectors.
References
Link Resource
https://jvn.jp/en/jp/JVN88993473/ Third Party Advisory
https://www.elecom.co.jp/news/security/20211130-01/ Patch Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: jpcert

Published: 2022-03-31T08:55:11

Updated: 2022-03-31T08:55:10

Reserved: 2022-03-10T00:00:00


Link: CVE-2022-25915

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-03-31T09:15:11.537

Modified: 2023-08-08T14:21:49.707


Link: CVE-2022-25915

JSON object: View

cve-icon Redhat Information

No data.