Description
OS command injection vulnerability exists in WRC-X1500GS-B and WRC-X1500GSA-B. A crafted request from a logged-in user may lead to an arbitrary OS command execution.
Published: 2026-02-03
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an OS command injection in the Elecom WRC‑X1500GS‑B and WRC‑X1500GSA‑B router models. A crafted request sent by a user that is already authenticated to the router can inject arbitrary shell commands, enabling the attacker to control the device’s operating system. Based on the description, it is inferred that this level of access could lead to a full compromise of confidentiality, integrity, and availability, consistent with the CWE‑78 classification.

Affected Systems

The affected devices are the Elecom WRC‑X1500GS‑B and WRC‑X1500GSA‑B models. The flaw resides in their firmware and is not limited to specific firmware versions, so any router running the default or previously supplied firmware may be vulnerable. The vulnerability is documented for the hardware revisions as listed by Elecom.

Risk and Exploitability

The CVSS base score is 8.6, indicating a high severity flaw, yet the EPSS probability is below 1 %, suggesting rare exploitation in the wild. The flaw requires the attacker to have authenticated access to the router’s administrative interface, so the attack vector is likely internal or from an attacker who has compromised a legitimate user’s credentials. The router is not listed in the CISA KEV catalog, but its ability to execute arbitrary OS commands makes it a critical asset if exposed.

Generated by OpenCVE AI on April 18, 2026 at 14:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the latest firmware update released by Elecom that fixes the command injection flaw.
  • Restrict administrative access to the router to trusted networks and enforce strong authentication mechanisms.
  • Disable any unused management services, ports, and protocols to reduce the attack surface.
  • Monitor the router’s system logs for abnormal command execution attempts to detect exploitation.

Generated by OpenCVE AI on April 18, 2026 at 14:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
Title OS Command Injection in Elecom WRC Router Models

Fri, 10 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Elecom wrc-x1500gs-b Firmware
Elecom wrc-x1500gsa-b Firmware
CPEs cpe:2.3:h:elecom:wrc-x1500gs-b:-:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wrc-x1500gsa-b:-:*:*:*:*:*:*:*
cpe:2.3:o:elecom:wrc-x1500gs-b_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:elecom:wrc-x1500gsa-b_firmware:*:*:*:*:*:*:*:*
Vendors & Products Elecom wrc-x1500gs-b Firmware
Elecom wrc-x1500gsa-b Firmware
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Elecom
Elecom wrc-x1500gs-b
Elecom wrc-x1500gsa-b
Vendors & Products Elecom
Elecom wrc-x1500gs-b
Elecom wrc-x1500gsa-b

Tue, 03 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Description OS command injection vulnerability exists in WRC-X1500GS-B and WRC-X1500GSA-B. A crafted request from a logged-in user may lead to an arbitrary OS command execution.
Weaknesses CWE-78
References
Metrics cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Elecom Wrc-x1500gs-b Wrc-x1500gs-b Firmware Wrc-x1500gsa-b Wrc-x1500gsa-b Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-02-03T15:55:14.398Z

Reserved: 2026-01-30T01:42:48.683Z

Link: CVE-2026-22550

cve-icon Vulnrichment

Updated: 2026-02-03T15:55:11.236Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T07:16:12.713

Modified: 2026-04-10T14:35:37.407

Link: CVE-2026-22550

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:30:02Z

Weaknesses