|
[Japanese]
|
JVNDB-2026-000019
|
Multiple vulnerabilities in ELECOM wireless LAN products
|
Wireless LAN products provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below.- Cross-site request forgery (CWE-352) - CVE-2026-20704
- OS command injection (CWE-78) - CVE-2026-22550
- Use of weak credentials (CWE-1391) - CVE-2026-24449
- Stack-based buffer overflow (CWE-121) - CVE-2026-24465
CVE-2026-20704, CVE-2026-22550
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2026-24449
Soh Satoh reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2026-24465
MASAHIRO IIDA of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 9.8 (Critical) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
|
The above CVSS base scores have been assigned for CVE-2026-24465
|
CVSS v3 Severity
Base Metrics: 4.3(Medium) [IPA Score]
- Access Vector : Network
- Attack Complexity : Low
- Privileges Required : None
- User Interaction : Required
- Scope : Unchanged
- Confidentiality Impact : None
- Integrity Impact : Low
- Availability Impact : None
The above CVSS base scores have been assigned for CVE-2026-20704
|
CVSS v3 Severity
Base Metrics: 7.2(High) [IPA Score]
- Access Vector : Network
- Attack Complexity : Low
- Privileges Required : High
- User Interaction : None
- Scope : Unchanged
- Confidentiality Impact : High
- Integrity Impact : High
- Availability Impact : High
The above CVSS base scores have been assigned for CVE-2026-22550
|
CVSS v3 Severity
Base Metrics: 4.6(Medium) [IPA Score]
- Access Vector : Physical
- Attack Complexity : Low
- Privileges Required : None
- User Interaction : None
- Scope : Unchanged
- Confidentiality Impact : High
- Integrity Impact : None
- Availability Impact : None
The above CVSS base scores have been assigned for CVE-2026-24449
|
|
ELECOM CO.,LTD.
- WAB-S300IW-AC v5.5.00 and earlier versions (CVE-2026-24465)
- WAB-S300IW-PD all versions (CVE-2026-24465)
- WAB-S300IW2-PD v5.5.00 and earlier versions (CVE-2026-24465)
- WAB-S733IW-AC v5.5.00 and earlier versions (CVE-2026-24465)
- WAB-S733IW-PD all versions (CVE-2026-24465)
- WAB-S733IW2-PD v5.5.00 and earlier versions (CVE-2026-24465)
- WRC-X1500GS-B v1.12 and earlier versions (CVE-2026-20704, CVE-2026-22550)
- WRC-X1500GS-B all versions (CVE-2026-24449)
- WRC-X1500GSA-B v1.12 and earlier versions (CVE-2026-20704, CVE-2026-22550)
- WRC-X1500GSA-B all versions (CVE-2026-24449)
|
|
- If a user accesses a malicious page while logged-in to the affected product, unintended operations may be performed. (CVE-2026-20704)
- An arbitrary OS command may be executed by a logged-in user. (CVE-2026-22550)
- The initial passwords can be calculated easily from the system information. (CVE-2026-24449)
- A crafted packet may lead to arbitrary code execution. (CVE-2026-24465)
|
[Update and configure the firmware properly, or Stop using the products]
The updated firmwares are available to fix these issues for the supported models.
Update the firmware to the latest version according to the information provided by the developer.
WAB-S733IW-PD and WAB-S300IW-PD are no longer supported, therefore stop using these models.
After updating the firmware, change the passwords for the admin page and Wi-Fi connection to a strong, hard-to-guess, ones.
|
ELECOM CO.,LTD.
|
- Cross-Site Request Forgery(CWE-352) [IPA Evaluation]
- OS Command Injection(CWE-78) [IPA Evaluation]
- No Mapping(CWE-Other) [IPA Evaluation]
|
- CVE-2026-20704
- CVE-2026-22550
- CVE-2026-24449
- CVE-2026-24465
|
- JVN : JVN#94012927
|
- [2026/02/03]
Web page was published
|