Description
ELECOM wireless LAN access point devices implement CSRF protection mechanism, but with inadequate handling of CSRF tokens. If a user views a malicious page while logged in, the user may be tricked to do unintended operations.
Published: 2026-05-13
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from an incorrect implementation of the CSRF protection mechanism in ELECOM wireless LAN access points, allowing an attacker to trick a logged‑in user into performing unintended configuration actions while visiting a malicious webpage. The flaw can lead to unauthorized modification of device settings, compromising the integrity of the device’s configuration, but it does not directly enable remote code execution.

Affected Systems

Affected products are ELECOM CO.,LTD. wireless LAN access points model WAB‑BE187‑M, WAB‑BE36‑M, WAB‑BE36‑S, and WAB‑BE72‑M. No specific firmware version is listed, so any firmware with the flawed CSRF handling may be vulnerable.

Risk and Exploitability

The CVSS score of 5.1 indicates a medium severity. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting that known exploits are not publicly documented. Nevertheless, an attacker can exploit this vulnerability by having the user authenticated to the device’s web interface and then visiting a malicious site, thereby causing the device to perform unauthorized operations. The risk of exploitation exists as soon as an authenticated user actively browses the web and should be mitigated promptly.

Generated by OpenCVE AI on May 13, 2026 at 14:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the latest firmware update from ELECOM that corrects the CSRF validation flaw.
  • Restrict access to the device’s web management interface to trusted IP addresses or disable it when not needed to reduce exposure to CSRF attacks.
  • Ensure that state‑changing operations require a unique, per‑session CSRF token and that the token is verified against the user’s session before processing.

Generated by OpenCVE AI on May 13, 2026 at 14:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 17 May 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Elecom
Elecom wab-be187-m
Elecom wab-be36-m
Elecom wab-be36-s
Elecom wab-be72-m
Vendors & Products Elecom
Elecom wab-be187-m
Elecom wab-be36-m
Elecom wab-be36-s
Elecom wab-be72-m

Wed, 13 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 13 May 2026 14:30:00 +0000

Type Values Removed Values Added
Title Improper CSRF Token Handling in ELECOM Wireless LAN Access Point Firmware

Wed, 13 May 2026 12:45:00 +0000

Type Values Removed Values Added
Description ELECOM wireless LAN access point devices implement CSRF protection mechanism, but with inadequate handling of CSRF tokens. If a user views a malicious page while logged in, the user may be tricked to do unintended operations.
Weaknesses CWE-344
References
Metrics cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Elecom Wab-be187-m Wab-be36-m Wab-be36-s Wab-be72-m
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-05-13T15:04:39.032Z

Reserved: 2026-05-07T05:47:12.897Z

Link: CVE-2026-42961

cve-icon Vulnrichment

Updated: 2026-05-13T15:04:00.000Z

cve-icon NVD

Status : Deferred

Published: 2026-05-13T13:16:44.337

Modified: 2026-05-13T15:47:10.327

Link: CVE-2026-42961

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T19:41:58Z

Weaknesses