CVE-2026-40621
ELECOM · Wireless LAN Access Point
Certain ELECOM wireless LAN access points contain an authentication bypass vulnerability, allowing unauthenticated access to specific web URLs.
Executive summary
An authentication bypass vulnerability in ELECOM wireless LAN access points allows unauthenticated attackers to access sensitive management functions.
Vulnerability
The device web interface does not require authentication for specific URLs, allowing an unauthenticated attacker to access or manipulate device settings.
Business impact
The CVSS score of 9.8 highlights a severe risk to network infrastructure. Unauthorized access to access point settings can allow an attacker to modify network configuration, intercept traffic, or disable security features, leading to a complete compromise of the wireless network.
Remediation
Immediate Action: Check the ELECOM support website for firmware updates and apply them to all affected wireless access points.
Proactive Monitoring: Monitor network management traffic for unauthorized access attempts to the device web interface.
Compensating Controls: Place the management interface of the access points on a separate, isolated VLAN and restrict access to authorized administrative workstations only.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
Network administrators should prioritize updating firmware for all ELECOM access points. Until updates are applied, ensure management interfaces are not accessible from the public internet or untrusted internal segments.