Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-22366


Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.


Published

2024-01-24T05:15:13.823

Last Modified

2025-06-20T20:15:28.973

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.8 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-78
  • Type: Secondary
    CWE-78

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System yamaha wlx222_firmware < 24.00.04 Yes
Hardware yamaha wlx222 - No
Operating System yamaha wlx413_firmware < 22.00.06 Yes
Hardware yamaha wlx413 - No
Operating System yamaha wlx212_firmware < 21.00.13 Yes
Hardware yamaha wlx212 - No
Operating System yamaha wlx313_firmware < 18.00.13 Yes
Hardware yamaha wlx313 - No
Operating System yamaha wlx202_firmware < 16.00.19 Yes
Hardware yamaha wlx202 - No

References