Description
ELECOM wireless LAN access point devices do not require authentication to access some specific URLs. The affected product may be operated without authentication.
Published: 2026-05-13
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability enables unauthenticated users to access specific URLs on Elecom wireless LAN access points. Because the device does not enforce authentication, an attacker can perform administrative functions such as configuration changes, firmware updates, or network traffic monitoring. The weakness is classified as CWE-288, highlighting a failure to enforce authentication controls, and effectively turns the device into a controllable target without authorization.

Affected Systems

Affected products are Elecom Co., Ltd. wireless LAN access points: WRC-BE65QSD-B, WRC-BE72XSD-B, WRC-BE72XSD-BA, and WRC-W702-B. All listed models run firmware that allows open-access management URLs, making them vulnerable before the official firmware release.

Risk and Exploitability

The CVSS score of 9.3 indicates critical severity, while the EPSS is not available and the vulnerability is not in the CISA KEV catalog. The attack vector is likely local network access where an unauthenticated attacker on the same LAN can reach the vulnerable URLs. The lack of authentication enables complete control of the device, presenting a high risk of network compromise.

Generated by OpenCVE AI on May 13, 2026 at 14:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest firmware update released by Elecom on May 12, 2026 for all affected models.
  • Restrict the network paths to the device’s management URLs by configuring firewall rules or by disabling the management interface on unused ports.
  • Require authentication for all management functions and remove any default or anonymous access settings on the device.

Generated by OpenCVE AI on May 13, 2026 at 14:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Elecom Co.,ltd.
Elecom Co.,ltd. wrc-be65qsd-b
Elecom Co.,ltd. wrc-be72xsd-b
Elecom Co.,ltd. wrc-be72xsd-ba
Elecom Co.,ltd. wrc-w702-b
Vendors & Products Elecom Co.,ltd.
Elecom Co.,ltd. wrc-be65qsd-b
Elecom Co.,ltd. wrc-be72xsd-b
Elecom Co.,ltd. wrc-be72xsd-ba
Elecom Co.,ltd. wrc-w702-b

Wed, 13 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 May 2026 14:30:00 +0000

Type Values Removed Values Added
Title Authentication Bypass on Elecom Wireless LAN Access Points Allowing Unauthenticated Control

Wed, 13 May 2026 12:45:00 +0000

Type Values Removed Values Added
Description ELECOM wireless LAN access point devices do not require authentication to access some specific URLs. The affected product may be operated without authentication.
Weaknesses CWE-288
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Elecom Co.,ltd. Wrc-be65qsd-b Wrc-be72xsd-b Wrc-be72xsd-ba Wrc-w702-b
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-05-13T15:07:44.580Z

Reserved: 2026-05-07T05:46:57.272Z

Link: CVE-2026-40621

cve-icon Vulnrichment

Updated: 2026-05-13T15:07:39.793Z

cve-icon NVD

Status : Deferred

Published: 2026-05-13T13:16:42.750

Modified: 2026-05-13T15:47:10.327

Link: CVE-2026-40621

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T14:34:35Z

Weaknesses