- Description
- The wireless router WRTM326 from SECOM does not properly validate a specific parameter. An unauthenticated remote attacker could execute arbitrary system commands by sending crafted requests.
- Source
- twcert@cert.org.tw
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- twcert@cert.org.tw
- CWE-78
- Hype score
- Not currently trending
🚨 Critical Vulnerability in SECOM WRTM326 Router (#CVE-2024-10119) https://t.co/ORp2uy7UMK
@UndercodeNews
1 Nov 2024
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-10119 The wireless router WRTM326 from SECOM does not properly validate a specific parameter. An unauthenticated remote attacker could execute arbitrary system commands by … https://t.co/dNbZ3gZR6y
@CVEnew
406 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-10119: CRITICAL] SECOM's WRTM326 wireless router lacks proper validation, allowing remote attackers to execute system commands. Critical vulnerability in need of immediate attention.#cybersecurity,#vulnerability https://t.co/CZTxyDkQKe https://t.co/UTnNDw0goI
@CveFindCom
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zte:wrtm326_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5D87CB20-EB64-4B9B-9E63-C57BFBCCA86E",
"versionEndIncluding": "2.3.20"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zte:wrtm326:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4B913028-45E6-4BAF-BABA-17B5F53FCBFB"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]