ELECOM wireless LAN access point devices use a hard-coded cryptographic key when creating backups of configuration files. An attacker who knows the encryption key can tamper the configuration file of the product, and a victim administrator may be tricked to use a crafted configuration file.
Metrics
Affected Vendors & Products
References
History
Sun, 17 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elecom
Elecom wrc-x1800gs-b Elecom wrc-x1800gsa-b Elecom wrc-x1800gsh-b Elecom wrc-x3000gs2-b Elecom wrc-x3000gs2-w Elecom wrc-x3000gs2a-b Elecom wrc-x6000qs-g Elecom wrc-x6000qsa-g Elecom wrc-x6000xs-g Elecom wrc-x6000xst-g Elecom wrc-xe5400gs-g Elecom wrc-xe5400gsa-g |
|
| Vendors & Products |
Elecom
Elecom wrc-x1800gs-b Elecom wrc-x1800gsa-b Elecom wrc-x1800gsh-b Elecom wrc-x3000gs2-b Elecom wrc-x3000gs2-w Elecom wrc-x3000gs2a-b Elecom wrc-x6000qs-g Elecom wrc-x6000qsa-g Elecom wrc-x6000xs-g Elecom wrc-x6000xst-g Elecom wrc-xe5400gs-g Elecom wrc-xe5400gsa-g |
Wed, 13 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ELECOM wireless LAN access point devices use a hard-coded cryptographic key when creating backups of configuration files. An attacker who knows the encryption key can tamper the configuration file of the product, and a victim administrator may be tricked to use a crafted configuration file. | |
| Weaknesses | CWE-321 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published: 2026-05-13T12:01:20.724Z
Updated: 2026-05-13T18:26:26.218Z
Reserved: 2026-05-07T05:47:06.075Z
Link: CVE-2026-25107
Updated: 2026-05-13T18:26:22.969Z
Status : Deferred
Published: 2026-05-13T13:16:37.160
Modified: 2026-05-13T15:47:10.327
Link: CVE-2026-25107
No data.
ReportizFlow