Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-39222

EPSS 0.80% · P74
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-39222

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command that is not intended to be executed from the web interface by sending a specially crafted request. Affected products and versions are as follows: ACERA 1320 firmware ver.01.26 and earlier, ACERA 1310 firmware ver.01.26 and earlier, ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, ACERA 1020 firmware ver.01.86 and earlier, ACERA 1010 firmware ver.01.86 and earlier, ACERA 950 firmware ver.01.60 and earlier, ACERA 850F firmware ver.01.60 and earlier, ACERA 900 firmware ver.02.54 and earlier, ACERA 850M firmware ver.02.06 and earlier, ACERA 810 firmware ver.03.74 and earlier, and ACERA 800ST firmware ver.07.35 and earlier. They are affected when running in ST(Standalone) mode.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Furuno wireless LAN access point devices 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Furuno wireless LAN access point devices是日本Furuno公司的一系列无线设备。 FURUNO SYSTEMS wireless LAN access point devices存在操作系统命令注入漏洞,该漏洞源于允许经过身份验证的用户通过发送特制请求来执行不应从 Web 界面执行的任意操作系统命令,以下产品和版本受到影响:ACERA 1320 固件版本 01.26 及之前版本、ACERA 1310 固件版本 01.26 及之前版本、ACERA 1210 固件版本
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
FURUNO SYSTEMS Co.,Ltd.ACERA 1320 firmware ver.01.26 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1310 firmware ver.01.26 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1210 firmware ver.02.36 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1150i firmware ver.01.35 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1150w firmware ver.01.35 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1110 firmware ver.01.76 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1020 firmware ver.01.86 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1010 firmware ver.01.86 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 950 firmware ver.01.60 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 850F firmware ver.01.60 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 900 firmware ver.02.54 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 850M firmware ver.02.06 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 810 firmware ver.03.74 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 800ST firmware ver.07.35 and earlier -

II. Public POCs for CVE-2023-39222

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-39222

登录查看更多情报信息。

Same Patch Batch · FURUNO SYSTEMS Co.,Ltd. · 2023-10-03 · 5 CVEs total

CVE-2023-43627Furuno ACERA 1320 路径遍历漏洞
CVE-2023-42771Furuno ACERA 1320 授权问题漏洞
CVE-2023-41086Furuno wireless LAN access point devices 跨站请求伪造漏洞
CVE-2023-39429Furuno wireless LAN access point devices 跨站脚本漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2023-39222

No comments yet


Leave a comment