CVE-2026-42062

ELECOM · Wireless LAN Access Point

ELECOM wireless LAN access points are vulnerable to OS command injection via the username parameter, allowing unauthenticated remote code execution.

Executive summary

An unauthenticated OS command injection vulnerability in ELECOM wireless LAN access points allows attackers to execute arbitrary code on the device.

Vulnerability

The device fails to properly sanitize the username parameter, leading to OS command injection. An unauthenticated attacker can exploit this to execute arbitrary commands with device-level privileges.

Business impact

A CVSS score of 9.8 signifies a critical threat to network integrity. Exploitation allows an attacker to take full control of the wireless access point, potentially enabling traffic interception, redirection, or the use of the device as a pivot point into the local network.

Remediation

Immediate Action: Update the firmware on all ELECOM access points to the latest secure version provided by the vendor.

Proactive Monitoring: Monitor device logs for shell-like characters or suspicious command patterns in web request parameters.

Compensating Controls: Isolate the management interface and restrict access to authorized personnel to mitigate the risk from remote attackers.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

This is a critical vulnerability that allows full device compromise. Immediate firmware updates are required to mitigate the risk of remote code execution.