CVE-2026-42062
ELECOM · Wireless LAN Access Point
ELECOM wireless LAN access points are vulnerable to OS command injection via the username parameter, allowing unauthenticated remote code execution.
Executive summary
An unauthenticated OS command injection vulnerability in ELECOM wireless LAN access points allows attackers to execute arbitrary code on the device.
Vulnerability
The device fails to properly sanitize the username parameter, leading to OS command injection. An unauthenticated attacker can exploit this to execute arbitrary commands with device-level privileges.
Business impact
A CVSS score of 9.8 signifies a critical threat to network integrity. Exploitation allows an attacker to take full control of the wireless access point, potentially enabling traffic interception, redirection, or the use of the device as a pivot point into the local network.
Remediation
Immediate Action: Update the firmware on all ELECOM access points to the latest secure version provided by the vendor.
Proactive Monitoring: Monitor device logs for shell-like characters or suspicious command patterns in web request parameters.
Compensating Controls: Isolate the management interface and restrict access to authorized personnel to mitigate the risk from remote attackers.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
This is a critical vulnerability that allows full device compromise. Immediate firmware updates are required to mitigate the risk of remote code execution.