Impact
ELECOM wireless LAN access point devices are vulnerable to an OS command injection flaw in the handling of the username parameter. An attacker can supply a specially crafted request that causes the system to execute arbitrary operating system commands. The impact is the potential execution of any command with the privileges of the affected service, leading to full compromise of the device and its network segment. The weakness is a classic command injection problem as identified by CWE-78.
Affected Systems
Affected vendors and products include ELECOM, Ltd. wireless action points run by models WRC-BE65QSD-B, WRC-BE72XSD-B, WRC-BE72XSD-BA, and WRC-W702-B. No specific firmware or software version information is provided, so all installations of these models may be susceptible.
Risk and Exploitability
The CVSS score of 9.3 reflects a high severity, and the absence of authentication requirements means any network user can target the flaw. EPSS data is not available, but the lack of a KEV listing does not diminish the risk. The likely attack vector is a remote HTTP request directed at the device’s username field, and the exploit requires no credentials, making mitigation urgent.
OpenCVE Enrichment