JVN#03037325
Multiple vulnerabilities in ELECOM wireless LAN routers and access points (May 2026)
Overview
Multiple wireless LAN routers and access points provided by ELECOM CO.,LTD. contain multiple vulnerabilities.
Products Affected
CVE-2026-25107
- WRC-X3000GS2-B v1.09 and earlier
- WRC-X3000GS2-W v1.09 and earlier
- WRC-X3000GS2A-B v1.09 and earlier
- WRC-X3000GST2-B v1.06 and earlier
- WRC-X1800GS-B v1.19 and earlier
- WRC-X1800GSA-B v1.19 and earlier
- WRC-X1800GSH-B v1.19 and earlier
- WRC-X6000QS-G v1.14 and earlier
- WRC-X6000QSA-G v1.14 and earlier
- WRC-X6000XS-G v1.12 and earlier
- WRC-X6000XST-G v1.16 and earlier
- WRC-XE5400GS-G v1.13 and earlier
- WRC-XE5400GSA-G v1.13 and earlier
- WRC-BE72XSD-B v1.1.1 and earlier
- WRC-BE72XSD-BA v1.1.1 and earlier
- WRC-BE65QSD-B v1.1.0 and earlier
- WRC-W702-B v1.1.0 and earlier
- WAB-BE187-M v1.1.10 and earlier
- WAB-BE72-M v1.1.3 and earlier
- WAB-BE36-M v1.1.3 and earlier
- WAB-BE36-S v1.1.3 and earlier
Description
Multiple wireless LAN routers and access points provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below.
- Use of Hard-coded Cryptographic Key in creating backup of configuration files (CWE-321)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N Base Score 6.9
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Base Score 6.5
- CVE-2026-25107
- OS command injection in processing of ping_ip_addr parameter (CWE-78)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 8.6
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score 7.2 - CVE-2026-35506
- CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 8.6
- Missing authentication when accepting in specific URLs (CWE-288)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 9.3
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score 9.8 - CVE-2026-40621
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 9.3
- OS command injection in processing of username parameter (CWE-78)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 9.3
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score 9.8 - CVE-2026-42062
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 9.3
- Stored cross-site scripting due to inadequate hostname parameter handling (CWE-79)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Base Score 4.8
- CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N Base Score 4.8
- CVE-2026-42948
- Missing Check for language parameter (CWE-754)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N Base Score 5.1
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Base Score 4.3
- CVE-2026-42950
- Inadequate CSRF protection (CWE-344)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Base Score 5.1
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Base Score 4.3
- CVE-2026-42961
Impact
- The configuration file of the product may be tampered by an attacker who knows the encryption key (CVE-2026-25107)
- If processing a crafted request sent by a logged-in user, an arbitrary OS command may be executed (CVE-2026-35506)
- The affected product may be operated without authentication (CVE-2026-40621)
- An arbitrary OS command may be executed without authentication (CVE-2026-42062)
- If one of the administrators input malicious data, an arbitrary script may be executed in another administrative user's web browser (CVE-2026-42948)
- If a user views a malicious page while logged in, the admin page on the user's web browser may become broken (CVE-2026-42950)
- If a user views a malicious page while logged in, the user may be tricked to do unintended operations (CVE-2026-42961)
Solution
Update the firmware
Update the firmware to the latest version according to the information provided by the developer.
Vendor Status
| Vendor | Status | Last Update | Vendor Notes |
|---|---|---|---|
| ELECOM CO.,LTD. | Vulnerable | 2026/05/12 | ELECOM CO.,LTD. website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
The vulnerabilities are reported from the following people, and JPCERT/CC coordinated with the developer.
CVE-2026-25107, CVE-2026-42950, CVE-2026-42961
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA.
CVE-2026-42948
Sato Nobuhiro of Suzuki Motor Corporation, Futamata Keisuke of University Of Fukui, Takahashi Natsuki of Shizuoka University, Sasaki Miyu of Waseda University reported this vulnerability to IPA.
CVE-2026-35506, CVE-2026-40621, CVE-2026-42062
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
Other Information
| JPCERT Alert |
|
| JPCERT Reports |
|
| CERT Advisory |
|
| CPNI Advisory |
|
| TRnotes |
|
| CVE |
CVE-2026-25107 |
|
CVE-2026-35506 |
|
|
CVE-2026-40621 |
|
|
CVE-2026-42062 |
|
|
CVE-2026-42948 |
|
|
CVE-2026-42950 |
|
|
CVE-2026-42961 |
|
| JVN iPedia |
JVNDB-2026-000073 |