Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-39222
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command that is not intended to be executed from the web interface by sending a specially crafted request. Affected products and versions are as follows: ACERA 1320 firmware ver.01.26 and earlier, ACERA 1310 firmware ver.01.26 and earlier, ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, ACERA 1020 firmware ver.01.86 and earlier, ACERA 1010 firmware ver.01.86 and earlier, ACERA 950 firmware ver.01.60 and earlier, ACERA 850F firmware ver.01.60 and earlier, ACERA 900 firmware ver.02.54 and earlier, ACERA 850M firmware ver.02.06 and earlier, ACERA 810 firmware ver.03.74 and earlier, and ACERA 800ST firmware ver.07.35 and earlier. They are affected when running in ST(Standalone) mode.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Furuno wireless LAN access point devices 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Furuno wireless LAN access point devices是日本Furuno公司的一系列无线设备。 FURUNO SYSTEMS wireless LAN access point devices存在操作系统命令注入漏洞,该漏洞源于允许经过身份验证的用户通过发送特制请求来执行不应从 Web 界面执行的任意操作系统命令,以下产品和版本受到影响:ACERA 1320 固件版本 01.26 及之前版本、ACERA 1310 固件版本 01.26 及之前版本、ACERA 1210 固件版本
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
FURUNO SYSTEMS Co.,Ltd.ACERA 1320 firmware ver.01.26 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1310 firmware ver.01.26 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1210 firmware ver.02.36 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1150i firmware ver.01.35 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1150w firmware ver.01.35 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1110 firmware ver.01.76 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1020 firmware ver.01.86 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 1010 firmware ver.01.86 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 950 firmware ver.01.60 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 850F firmware ver.01.60 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 900 firmware ver.02.54 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 850M firmware ver.02.06 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 810 firmware ver.03.74 and earlier -
FURUNO SYSTEMS Co.,Ltd.ACERA 800ST firmware ver.07.35 and earlier -
II. Public POCs for CVE-2023-39222
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-39222
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-39222

No comments yet


Leave a comment