Overview
- Description
- SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
- Source
- twcert@cert.org.tw
- NVD status
- Awaiting Analysis
- CNA Tags
- unsupported-when-assigned
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Weaknesses
- twcert@cert.org.tw
- CWE-78
Social media
- Hype score
- Not currently trending
CVE-2024-10118 Unauthenticated Command Injection in SECOM WRTR-304GN-304TW-UPSC Devices SECOM WRTR-304GN-304TW-UPSC has a flaw that doesn't properly filter user input in a specific feature. This lets remote attac... https://t.co/zmEOcJkzNu
@VulmonFeeds
40 Impressions
1 Retweet
1 Like
1 Bookmark
0 Replies
0 Quotes
CVE-2024-10118 SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inje… https://t.co/YyMUUkmT6I
@CVEnew
565 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-10118: CRITICAL] Critical vulnerability in SECOM WRTR-304GN-304TW-UPSC allows remote attackers to execute arbitrary system commands through improper user input filtering. Take action immediately.#cybersecurity,#vulnerability https://t.co/nQES5S3ANK https://t.co/FMdAupus
@CveFindCom
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes