CVE-2024-22366

Severity CVSS v4.0:
Pending analysis
Type:
CWE-78 OS Command Injections
Publication date:
24/01/2024
Last modified:
20/06/2025

Description

Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:yamaha:wlx222_firmware:*:*:*:*:*:*:*:* 24.00.04 (excluding)
cpe:2.3:h:yamaha:wlx222:-:*:*:*:*:*:*:*
cpe:2.3:o:yamaha:wlx413_firmware:*:*:*:*:*:*:*:* 22.00.06 (excluding)
cpe:2.3:h:yamaha:wlx413:-:*:*:*:*:*:*:*
cpe:2.3:o:yamaha:wlx212_firmware:*:*:*:*:*:*:*:* 21.00.13 (excluding)
cpe:2.3:h:yamaha:wlx212:-:*:*:*:*:*:*:*
cpe:2.3:o:yamaha:wlx313_firmware:*:*:*:*:*:*:*:* 18.00.13 (excluding)
cpe:2.3:h:yamaha:wlx313:-:*:*:*:*:*:*:*
cpe:2.3:o:yamaha:wlx202_firmware:*:*:*:*:*:*:*:* 16.00.19 (excluding)
cpe:2.3:h:yamaha:wlx202:-:*:*:*:*:*:*:*