Refine your search

1 vulnerability found for WLX413 by Yamaha Corporation

CVE-2024-22366 (GCVE-0-2024-22366)
Vulnerability from cvelistv5
Published
2024-01-24 04:35
Modified
2025-06-20 19:27
CWE
  • Active debug code
Summary
Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.
Impacted products
Vendor Product Version
Yamaha Corporation WLX222 Version: firmware Rev.24.00.03 and earlier
Create a notification for this product.
   Yamaha Corporation WLX413 Version: firmware Rev.22.00.05 and earlier
Create a notification for this product.
   Yamaha Corporation WLX212 Version: firmware Rev.21.00.12 and earlier
Create a notification for this product.
   Yamaha Corporation WLX313 Version: firmware Rev.18.00.12 and earlier
Create a notification for this product.
   Yamaha Corporation WLX202 Version: firmware Rev.16.00.18 and earlier
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T22:43:34.585Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU99896362/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.8,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-22366",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-24T16:37:23.887340Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-78",
                "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-20T19:27:11.652Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "WLX222",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.24.00.03 and earlier"
            }
          ]
        },
        {
          "product": "WLX413",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.22.00.05 and earlier"
            }
          ]
        },
        {
          "product": "WLX212",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.21.00.12 and earlier"
            }
          ]
        },
        {
          "product": "WLX313",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.18.00.12 and earlier"
            }
          ]
        },
        {
          "product": "WLX202",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.16.00.18 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device\u0027s management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Active debug code",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-24T04:35:55.337Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU99896362/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2024-22366",
    "datePublished": "2024-01-24T04:35:55.337Z",
    "dateReserved": "2024-01-09T07:04:26.494Z",
    "dateUpdated": "2025-06-20T19:27:11.652Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}