{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-22372","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","state":"PUBLISHED","assignerShortName":"jpcert","dateReserved":"2024-01-10T00:47:14.234Z","datePublished":"2024-01-24T04:38:20.199Z","dateUpdated":"2025-06-17T21:19:28.869Z"},"containers":{"cna":{"affected":[{"vendor":"ELECOM CO.,LTD.","product":"WRC-X1500GS-B","versions":[{"version":"v1.11 and earlier","status":"affected"}]},{"vendor":"ELECOM CO.,LTD.","product":"WRC-X1500GSA-B","versions":[{"version":"v1.11 and earlier","status":"affected"}]},{"vendor":"ELECOM CO.,LTD.","product":"WRC-X1800GS-B","versions":[{"version":"v1.17 and earlier","status":"affected"}]},{"vendor":"ELECOM CO.,LTD.","product":"WRC-X1800GSA-B","versions":[{"version":"v1.17 and earlier","status":"affected"}]},{"vendor":"ELECOM CO.,LTD.","product":"WRC-X1800GSH-B","versions":[{"version":"v1.17 and earlier","status":"affected"}]},{"vendor":"ELECOM CO.,LTD.","product":"WRC-X3000GS2-B","versions":[{"version":"v1.08 and earlier","status":"affected"}]},{"vendor":"ELECOM CO.,LTD.","product":"WRC-X3000GS2-W","versions":[{"version":"v1.08 and earlier","status":"affected"}]},{"vendor":"ELECOM CO.,LTD.","product":"WRC-X3000GS2A-B","versions":[{"version":"v1.08 and earlier","status":"affected"}]},{"vendor":"ELECOM CO.,LTD.","product":"WRC-XE5400GS-G","versions":[{"version":"v1.12 and earlier","status":"affected"}]},{"vendor":"ELECOM CO.,LTD.","product":"WRC-XE5400GSA-G","versions":[{"version":"v1.12 and earlier","status":"affected"}]},{"vendor":"ELECOM CO.,LTD.","product":"WRC-X6000QS-G","versions":[{"version":"v1.13 and earlier","status":"affected"}]},{"vendor":"ELECOM CO.,LTD.","product":"WRC-X6000QSA-G","versions":[{"version":"v1.13 and earlier","status":"affected"}]},{"vendor":"ELECOM CO.,LTD.","product":"WRC-X6000XS-G","versions":[{"version":"v1.09","status":"affected"}]},{"vendor":"ELECOM CO.,LTD.","product":"WRC-X6000XST-G","versions":[{"version":"v1.12 and earlier","status":"affected"}]}],"descriptions":[{"lang":"en","value":"OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product."}],"problemTypes":[{"descriptions":[{"description":"Improper neutralization of special elements used in an OS command ('OS Command Injection')","lang":"en-US","cweId":"CWE-78","type":"CWE"}]}],"references":[{"url":"https://www.elecom.co.jp/news/security/20240123-01/"},{"url":"https://jvn.jp/en/vu/JVNVU90908488/"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_0":{"version":"3.0","baseSeverity":"MEDIUM","baseScore":6.8,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}}],"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2025-02-17T05:36:13.734Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T22:43:34.541Z"},"title":"CVE Program Container","references":[{"url":"https://www.elecom.co.jp/news/security/20240123-01/","tags":["x_transferred"]},{"url":"https://jvn.jp/en/vu/JVNVU90908488/","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-22372","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-01-24T14:15:29.894844Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-17T21:19:28.869Z"}}]}}