6.8 Medium
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.7%
Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device’s management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.
Vendor | Product | Version | CPE |
---|---|---|---|
yamaha | wlx222 | Re24.00.03 | cpe:2.3:h:yamaha:wlx222:Re24.00.03:*:*:*:*:*:*:* |
yamaha | wlx413 | Re22.00.05 | cpe:2.3:h:yamaha:wlx413:Re22.00.05:*:*:*:*:*:*:* |
yamaha | wlx212 | Re21.00.12 | cpe:2.3:h:yamaha:wlx212:Re21.00.12:*:*:*:*:*:*:* |
yamaha | wlx313 | Re18.00.12 | cpe:2.3:h:yamaha:wlx313:Re18.00.12:*:*:*:*:*:*:* |
yamaha | wlx202 | Re16.00.18 | cpe:2.3:h:yamaha:wlx202:Re16.00.18:*:*:*:*:*:*:* |
[
{
"vendor": "Yamaha Corporation",
"product": "WLX222",
"versions": [
{
"version": "firmware Rev.24.00.03 and earlier",
"status": "affected"
}
]
},
{
"vendor": "Yamaha Corporation",
"product": "WLX413",
"versions": [
{
"version": "firmware Rev.22.00.05 and earlier",
"status": "affected"
}
]
},
{
"vendor": "Yamaha Corporation",
"product": "WLX212",
"versions": [
{
"version": "firmware Rev.21.00.12 and earlier",
"status": "affected"
}
]
},
{
"vendor": "Yamaha Corporation",
"product": "WLX313",
"versions": [
{
"version": "firmware Rev.18.00.12 and earlier",
"status": "affected"
}
]
},
{
"vendor": "Yamaha Corporation",
"product": "WLX202",
"versions": [
{
"version": "firmware Rev.16.00.18 and earlier",
"status": "affected"
}
]
}
]
6.8 Medium
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.7%