Home

Description

Improper Neutralization of Special Elements used in an OS Command vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN MR02LN, WG1810HP(JE) and WG1810HP(MF) all versions allows a attacker to execute an arbitrary OS command with the root privilege via the internet.

PUBLISHED Reserved 2024-02-29 | Published 2024-03-28 | Updated 2025-01-14 | Assigner NEC

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command

Product status

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Default status
unknown

all versions
affected

Credits

Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University. reporter

References

https//jpn.nec.com/security-info/secinfo/nv24-001_en.html

jpn.nec.com/security-info/secinfo/nv24-001_en.html

cve.org (CVE-2024-28015)

nvd.nist.gov (CVE-2024-28015)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.