Stack-based Buffer Overflow in ELECOM Wireless LAN Access Point Devices
CVE-2026-24465

9.3CRITICAL

Key Information:

Vendor
CVE Published:
3 February 2026

What is CVE-2026-24465?

CVE-2026-24465 is a stack-based buffer overflow vulnerability found in ELECOM wireless LAN access point devices manufactured by Elecom Co., Ltd. This vulnerability arises due to improper handling of crafted packets, allowing attackers to potentially execute arbitrary code on the affected devices. Wireless LAN access points are critical components in networking infrastructure, facilitating communication between devices and providing internet access. The exploitation of this vulnerability could lead to unauthorized access, compromising the integrity and confidentiality of sensitive data transmitted over the network. Given the role of these devices in an organization’s IT environment, such vulnerabilities pose a significant risk to operational stability and security.

Potential impact of CVE-2026-24465

  1. Arbitrary Code Execution: The primary risk is that an attacker could exploit this vulnerability to execute arbitrary code on the access point, which could allow them to manipulate network traffic, deploy additional malware, or gain access to sensitive information.

  2. Network Compromise: Successful exploitation could lead to a complete compromise of the network environment. This means that attackers could potentially access all devices connected to the network, putting corporate resources, intellectual property, and sensitive data at risk.

  3. Disruption of Services: The vulnerability could also lead to service disruptions. With attackers gaining control, they could disable the access point, resulting in loss of connectivity for users and impacting business operations and communications adversely.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

WAB-S300IW-AC v5.5.00 and earlier versions

WAB-S300IW-PD all versions

WAB-S300IW2-PD v5.5.00 and earlier versions

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

CVSS V3.0

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.