CVE-2026-22550
Elecom · WRC-X1500GS-B and WRC-X1500GSA-B Routers
An OS command injection vulnerability exists in Elecom WRC-X1500GS-B and WRC-X1500GSA-B routers, allowing for arbitrary command execution.
Executive summary
A critical OS command injection vulnerability in Elecom WRC-X1500 series routers allows attackers to execute arbitrary system commands and gain full control over the device.
Vulnerability
This vulnerability is an OS command injection flaw. It occurs when the router's software fails to properly sanitize user input before passing it to a system shell. An attacker can exploit this to run malicious commands with the privileges of the web server or system user.
Business impact
The impact is severe, as command injection leads to total device takeover. Attackers can install persistent backdoors, sniff network traffic, or pivot to other devices on the local network. The CVSS score of 7.2 reflects the high risk to confidentiality, integrity, and availability.
Remediation
Immediate Action: Flash the router with the latest security firmware update from Elecom to eliminate the command injection vector.
Proactive Monitoring: Monitor for unusual outbound traffic or unauthorized changes to the router’s filesystem and configuration files.
Compensating Controls: Restrict access to the router’s management interface to trusted internal IP addresses only and disable any unnecessary services.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability poses a direct threat to the security of the internal network. Immediate firmware updates are the only effective remediation. If an update is not available, the device should be replaced with a secure alternative.