acera_1310_firmware 安全漏洞 (CVE-2023-39222)
CVE编号
CVE-2023-39222利用情况
暂无补丁情况
N/A披露时间
2023-10-03漏洞描述
OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command that is not intended to be executed from the web interface by sending a specially crafted request. Affected products and versions are as follows: ACERA 1320 firmware ver.01.26 and earlier, ACERA 1310 firmware ver.01.26 and earlier, ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, ACERA 1020 firmware ver.01.86 and earlier, ACERA 1010 firmware ver.01.86 and earlier, ACERA 950 firmware ver.01.60 and earlier, ACERA 850F firmware ver.01.60 and earlier, ACERA 900 firmware ver.02.54 and earlier, ACERA 850M firmware ver.02.06 and earlier, ACERA 810 firmware ver.03.74 and earlier, and ACERA 800ST firmware ver.07.35 and earlier. They are affected when running in ST(Standalone) mode.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://jvn.jp/en/vu/JVNVU94497038/ | |
https://www.furunosystems.co.jp/news/info/vulner20231002.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | furunosystems | acera_1010_firmware | * | Up to (including) 01.86 | |||||
运行在以下环境 | |||||||||
系统 | furunosystems | acera_1020_firmware | * | Up to (including) 01.86 | |||||
运行在以下环境 | |||||||||
系统 | furunosystems | acera_1110_firmware | * | Up to (including) 01.76 | |||||
运行在以下环境 | |||||||||
系统 | furunosystems | acera_1150i_firmware | * | Up to (including) 01.35 | |||||
运行在以下环境 | |||||||||
系统 | furunosystems | acera_1150w_firmware | * | Up to (including) 01.35 | |||||
运行在以下环境 | |||||||||
系统 | furunosystems | acera_1210_firmware | * | Up to (including) 02.36 | |||||
运行在以下环境 | |||||||||
系统 | furunosystems | acera_1310_firmware | * | Up to (including) 01.26 | |||||
运行在以下环境 | |||||||||
系统 | furunosystems | acera_1320_firmware | * | Up to (including) 01.26 | |||||
运行在以下环境 | |||||||||
系统 | furunosystems | acera_800st_firmware | * | Up to (including) 07.35 | |||||
运行在以下环境 | |||||||||
系统 | furunosystems | acera_810_firmware | * | Up to (including) 03.74 | |||||
运行在以下环境 | |||||||||
系统 | furunosystems | acera_850f_firmware | * | Up to (including) 01.60 | |||||
运行在以下环境 | |||||||||
系统 | furunosystems | acera_850m_firmware | * | Up to (including) 02.06 | |||||
运行在以下环境 | |||||||||
系统 | furunosystems | acera_900_firmware | * | Up to (including) 02.54 | |||||
运行在以下环境 | |||||||||
系统 | furunosystems | acera_950_firmware | * | Up to (including) 01.60 | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_1010 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_1020 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_1110 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_1150i | - | - | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_1150w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_1210 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_1310 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_1320 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_800st | - | - | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_810 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_850f | - | - | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_850m | - | - | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_900 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | furunosystems | acera_950 | - | - | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-78 | OS命令中使用的特殊元素转义处理不恰当(OS命令注入) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论