CVE-2023-39455
moderate-risk
Published 2023-08-18
OS command injection vulnerability in ELECOM wireless LAN routers allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WRC-600GHBK-A all versions, WRC-1467GHBK-A all versions, WRC-1900GHBK-A all versions, WRC-733FEBK2-A all versions, WRC-F1167ACF2 all versions, WRC-1467GHBK-S all versions, and WRC-1900GHBK-S all versions.
Do I need to act?
~
1.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (7)
Wrc-600Ghbk-A Firmware
Wrc-1467Ghbk-A Firmware
Wrc-1900Ghbk-A Firmware
Wrc-733Febk2-A Firmware
Wrc-F1167Acf2 Firmware
Wrc-1467Ghbk-S Firmware
Wrc-1900Ghbk-S Firmware
Affected Vendors
References (4)
Third Party Advisory
https://jvn.jp/en/vu/JVNVU91630351/
Vendor Advisory
https://www.elecom.co.jp/news/security/20230810-01/
Third Party Advisory
https://jvn.jp/en/vu/JVNVU91630351/
Vendor Advisory
https://www.elecom.co.jp/news/security/20230810-01/
48
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
4/34 · Minimal
Exposure
14/34 · Moderate