Overview
- Description
- The wireless router WRTM326 from SECOM does not properly validate a specific parameter. An unauthenticated remote attacker could execute arbitrary system commands by sending crafted requests.
- Source
- twcert@cert.org.tw
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Weaknesses
- twcert@cert.org.tw
- CWE-78
Social media
- Hype score
- Not currently trending
🚨 Critical Vulnerability in SECOM WRTM326 Router (#CVE-2024-10119) https://t.co/ORp2uy7UMK
@UndercodeNews
1 Nov 2024
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-10119 The wireless router WRTM326 from SECOM does not properly validate a specific parameter. An unauthenticated remote attacker could execute arbitrary system commands by … https://t.co/dNbZ3gZR6y
@CVEnew
406 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-10119: CRITICAL] SECOM's WRTM326 wireless router lacks proper validation, allowing remote attackers to execute system commands. Critical vulnerability in need of immediate attention.#cybersecurity,#vulnerability https://t.co/CZTxyDkQKe https://t.co/UTnNDw0goI
@CveFindCom
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:wrtm326_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D87CB20-EB64-4B9B-9E63-C57BFBCCA86E", "versionEndIncluding": "2.3.20" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:wrtm326:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4B913028-45E6-4BAF-BABA-17B5F53FCBFB" } ], "operator": "OR" } ], "operator": "AND" } ]