Jump to the main content block

【Vulnerability Alert】Taiwan Secom WRTM326 - OS Command Injection

publish date : 2024-10-22 update date : 2024-10-22

Source: Ministry of education information & communication security contingency platform

Publication Number TACERT-ANA-2024102101101414 Publication Time 2024/10/21 13:18
Incident Type ANA-Vulnerability Alert Discovery Time 2024/10/19 13:18
Impact Level Medium  
[Subject]
【Vulnerability Alert】Taiwan Secom WRTM326 - OS Command Injection
[Content]
Forwarded from TWCERTCC-200-202410-00000011

TWCERT/CC issued TVN-202410017, CVE-2024-10119 (CVSS: 9.8) on 2024-10-18. Taiwan Secom wireless router WRTM326 does not properly validate specific parameters, allowing remote attackers without authentication to send specially crafted requests and execute arbitrary system commands.

Information Sharing Level: WHITE (Information content can be publicly disclosed)
[Affected Platform]
WRTM326 version 2.3.20 and earlier (excluding 2.3.20)
[Recommended Actions]
Update WRTM326 to version 2.3.20 or later.
[Reference]
Taiwan Secom WRTM326 - OS Command Injection:https://www.twcert.org.tw/tw/cp-132-8156-81c9d-1.html
(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center
Click Num: