Description
OS command injection vulnerability exists in ELECOM wireless LAN products. A crafted request from a logged-in user may lead to an arbitrary OS command execution.
Published: 2026-02-03
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an OS command injection in Elecom wireless LAN products. A crafted request originating from an authenticated user can inject arbitrary operating‑system commands, giving the attacker full control over the device’s system. This can lead to a complete compromise of confidentiality, integrity, and availability, consistent with the CWE‑78 classification.

Affected Systems

The affected devices are the Elecom WRC‑X1500GS‑B, WRC‑X1500GSA‑B, WRC‑X1800GS‑B, WRC‑X1800GSA‑B, WRC‑X1800GSH‑B, WRC‑X3000GS2‑B, WRC‑X3000GS2‑W, WRC‑X3000GS2A‑B, WRC‑X3000GST2‑B, WRC‑X6000QS‑G, WRC‑X6000QSA‑G, WRC‑X6000XS‑G, WRC‑X6000XST‑G, WRC‑XE5400GS‑G, and WRC‑XE5400GSA‑G. The flaw resides in their firmware and may affect any version running the default or previously supplied firmware. The router models listed by Elecom have been documented as vulnerable.

Risk and Exploitability

The CVSS base score is 8.6, indicating a high severity flaw, yet the EPSS probability is below 1 %, suggesting rare exploitation in the wild. The flaw requires the attacker to have authenticated access to the router’s administrative interface, so the attack vector is likely internal or from an attacker who has compromised a legitimate user’s credentials. The router is not listed in the CISA KEV catalog, but the ability to execute arbitrary OS commands makes it a critical asset if exposed.

Generated by OpenCVE AI on May 12, 2026 at 11:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the latest firmware update released by Elecom that fixes the command injection flaw.
  • Restrict administrative access to the router to trusted networks and enforce strong authentication mechanisms.
  • Disable any unused management services, ports, and protocols to reduce the attack surface.
  • Monitor the router’s system logs for abnormal command execution attempts to detect exploitation.

Generated by OpenCVE AI on May 12, 2026 at 11:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 11:30:00 +0000

Type Values Removed Values Added
Title OS Command Injection in Elecom WRC Router Models

Tue, 12 May 2026 08:30:00 +0000

Type Values Removed Values Added
Description OS command injection vulnerability exists in WRC-X1500GS-B and WRC-X1500GSA-B. A crafted request from a logged-in user may lead to an arbitrary OS command execution. OS command injection vulnerability exists in ELECOM wireless LAN products. A crafted request from a logged-in user may lead to an arbitrary OS command execution.

Sat, 18 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
Title OS Command Injection in Elecom WRC Router Models

Fri, 10 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Elecom wrc-x1500gs-b Firmware
Elecom wrc-x1500gsa-b Firmware
CPEs cpe:2.3:h:elecom:wrc-x1500gs-b:-:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wrc-x1500gsa-b:-:*:*:*:*:*:*:*
cpe:2.3:o:elecom:wrc-x1500gs-b_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:elecom:wrc-x1500gsa-b_firmware:*:*:*:*:*:*:*:*
Vendors & Products Elecom wrc-x1500gs-b Firmware
Elecom wrc-x1500gsa-b Firmware
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Elecom
Elecom wrc-x1500gs-b
Elecom wrc-x1500gsa-b
Vendors & Products Elecom
Elecom wrc-x1500gs-b
Elecom wrc-x1500gsa-b

Tue, 03 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Description OS command injection vulnerability exists in WRC-X1500GS-B and WRC-X1500GSA-B. A crafted request from a logged-in user may lead to an arbitrary OS command execution.
Weaknesses CWE-78
References
Metrics cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Elecom Wrc-x1500gs-b Wrc-x1500gs-b Firmware Wrc-x1500gsa-b Wrc-x1500gsa-b Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-05-12T08:09:24.537Z

Reserved: 2026-01-30T01:42:48.683Z

Link: CVE-2026-22550

cve-icon Vulnrichment

Updated: 2026-02-03T15:55:11.236Z

cve-icon NVD

Status : Modified

Published: 2026-02-03T07:16:12.713

Modified: 2026-05-12T09:16:18.053

Link: CVE-2026-22550

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T11:15:14Z

Weaknesses