Impact
This vulnerability is a stack‑based buffer overflow that can be triggered by a specially crafted packet. When the overflow occurs, an attacker may gain arbitrary code execution on the wireless LAN access point. The weakness is a classic stack corruption flaw (CWE‑121).
Affected Systems
The flaw affects Elecom wireless LAN access‑point models WAB‑S300IW‑AC, WAB‑S300IW‑PD, WAB‑S300IW2‑PD, WAB‑S733IW‑AC, WAB‑S733IW‑PD, and WAB‑S733IW2‑PD, including their firmware images.
Risk and Exploitability
The CVSS base score of 9.3 marks it as critical, but the EPSS score of less than 1% indicates that few exploits are observed or that the confidence in exploitation is low. It is not listed in the CISA KEV catalog. Attackers would need to send the crafted packet from the network to the device, suggesting a network‑based attack vector. The high severity and the ability to execute arbitrary code make it a top‑priority risk for exposed network interfaces.
OpenCVE Enrichment