Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.
References
| Link | Resource |
|---|---|
| http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html | Vendor Advisory |
| https://jvn.jp/en/vu/JVNVU99896362/ | Third Party Advisory |
| http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html | Vendor Advisory |
| https://jvn.jp/en/vu/JVNVU99896362/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
21 Nov 2024, 08:56
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html - Vendor Advisory | |
| References | () https://jvn.jp/en/vu/JVNVU99896362/ - Third Party Advisory |
30 Jan 2024, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
| CPE | cpe:2.3:h:yamaha:wlx413:-:*:*:*:*:*:*:* cpe:2.3:o:yamaha:wlx212_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:yamaha:wlx313_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:yamaha:wlx202_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:yamaha:wlx222_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:yamaha:wlx313:-:*:*:*:*:*:*:* cpe:2.3:o:yamaha:wlx413_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:yamaha:wlx222:-:*:*:*:*:*:*:* cpe:2.3:h:yamaha:wlx202:-:*:*:*:*:*:*:* cpe:2.3:h:yamaha:wlx212:-:*:*:*:*:*:*:* |
|
| CWE | CWE-78 | |
| References | () http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html - Vendor Advisory | |
| References | () https://jvn.jp/en/vu/JVNVU99896362/ - Third Party Advisory |
24 Jan 2024, 05:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-24 05:15
Updated : 2025-06-20 20:15
NVD link : CVE-2024-22366
Mitre link : CVE-2024-22366
CVE.ORG link : CVE-2024-22366
JSON object : View
Products Affected
yamaha
- wlx413_firmware
- wlx413
- wlx313_firmware
- wlx313
- wlx222
- wlx202_firmware
- wlx222_firmware
- wlx212
- wlx212_firmware
- wlx202
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
