[Japanese]

JVNDB-2023-009966

FXC wireless LAN routers "AE1021PE" and "AE1021" vulnerable to OS command injection Critical

Overview

"AE1021PE" and "AE1021" provided by FXC Inc. are information outlet-based wireless LAN routers.
"AE1021PE" and "AE1021" contain an OS command injection vulnerability (CWE-78).

JPCERT/CC has confirmed the communication which exploits this vulnerability.

Ryu Kuki, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer.
And almost at the same time, The Akamai SIRT reported this vulnerability to CISA. JPCERT/CC coordinated with the developer.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 8.0 (High) [Other]
  • Attack Vector: Adjacent Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
Affected Products


FXC Inc.
  • Wireless LAN router AE1021 firmware version 2.0.9 and earlier
  • Wireless LAN router AE1021PE firmware version 2.0.9 and earlier

Impact

An arbitrary OS command may be executed by an attacker who can log in to the product.
Solution

[Update the Firmware and Apply the appropriate settings]
The developer has released firmware 2.0.10 that addresses this vulnerability.
Update the firmware to 2.0.10, and apply the the following settings.

* Reset "Factory setting" and change the default management screen login password

For more information, refer to the information provided by the developer.
Vendor Information

FXC Inc.
CWE (What is CWE?)

  1. OS Command Injection(CWE-78) [Other]
CVE (What is CVE?)

  1. CVE-2023-49897
References

  1. JVN : JVNVU#92152057
  2. National Vulnerability Database (NVD) : CVE-2023-49897
  3. CISA Known Exploited Vulnerabilities Catalog : CVE-2023-49897
  4. ICS-CERT ADVISORY : ICSA-23-355-01
  5. Related document : Actively Exploited Vulnerability in FXC Routers: Fixed, Patches Available
Revision History

  • [2023/12/07]
      Web page was published
  • [2023/12/22]
       References : Content were added