Description
SHARP routers do not perform authentication for some web APIs. The device information may be retrieved without authentication. If the administrative password of the device is left as the initial one, the device may be taken over.
Published: 2026-03-25
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Device Takeover
Action: Apply Patch
AI Analysis

Impact

The routers lack authentication for certain web APIs, allowing anyone on the network to retrieve device information without credentials. If the device's administrative password remains set to the factory default, the attacker can gain full administrative control, effectively taking over the device. This issue is classified as an authentication bypass vulnerability (CWE-306).

Affected Systems

Sharp Corporation's 5G Mobile Router SH-U01, Pocket WiFi 5G A503SH, Speed Wi-Fi 5G X01, Wi-Fi STATION SH-52A, Wi-Fi STATION SH-52B, Wi-Fi STATION SH-54C, home 5G HR01, and home 5G HR02 are impacted. Version information is not specified, but all models shipped before the recent advisory are potentially vulnerable.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium-to-high severity. With no credentials required, an attacker who can reach the device over the network can automatically access the vulnerable endpoints, retrieve configuration data, and, if default credentials are still in use, assume administrative privileges. While the EPSS score is not available and the vulnerability is not listed in KEV, the lack of authentication makes exploitation straightforward and the potential impact significant.

Generated by OpenCVE AI on March 25, 2026 at 09:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update provided by Sharp to remediate the authentication bypass.
  • Change the default administrative password to a strong, unique password.
  • If remote management is unnecessary, disable remote access or block traffic to the affected web API ports.
  • Monitor the device logs for any unauthorized access attempts and review network traffic for anomalous activity.

Generated by OpenCVE AI on March 25, 2026 at 09:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Unauthorized Access to Sharp 5G Routers via Unauthenticated Web APIs

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sharp
Sharp 5g Mobile Router Sh-u01
Sharp home 5g Hr01
Sharp home 5g Hr02
Sharp pocket Wifi 5g A503sh
Sharp speed Wi-fi 5g X01
Sharp wi-fi Station Sh-52a
Sharp wi-fi Station Sh-52b
Sharp wi-fi Station Sh-54c
Vendors & Products Sharp
Sharp 5g Mobile Router Sh-u01
Sharp home 5g Hr01
Sharp home 5g Hr02
Sharp pocket Wifi 5g A503sh
Sharp speed Wi-fi 5g X01
Sharp wi-fi Station Sh-52a
Sharp wi-fi Station Sh-52b
Sharp wi-fi Station Sh-54c

Wed, 25 Mar 2026 08:00:00 +0000

Type Values Removed Values Added
Description SHARP routers do not perform authentication for some web APIs. The device information may be retrieved without authentication. If the administrative password of the device is left as the initial one, the device may be taken over.
Weaknesses CWE-306
References
Metrics cvssV3_0

{'score': 5.7, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Sharp 5g Mobile Router Sh-u01 Home 5g Hr01 Home 5g Hr02 Pocket Wifi 5g A503sh Speed Wi-fi 5g X01 Wi-fi Station Sh-52a Wi-fi Station Sh-52b Wi-fi Station Sh-54c
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-03-25T13:26:49.064Z

Reserved: 2026-03-12T06:43:35.484Z

Link: CVE-2026-32326

cve-icon Vulnrichment

Updated: 2026-03-25T13:26:45.602Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T08:16:22.547

Modified: 2026-03-25T15:41:33.977

Link: CVE-2026-32326

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T21:15:54Z

Weaknesses