Stack-based Buffer Overflow in ELECOM Wireless LAN Access Point Devices
CVE-2026-24465
What is CVE-2026-24465?
CVE-2026-24465 is a stack-based buffer overflow vulnerability found in ELECOM wireless LAN access point devices manufactured by Elecom Co., Ltd. This vulnerability arises due to improper handling of crafted packets, allowing attackers to potentially execute arbitrary code on the affected devices. Wireless LAN access points are critical components in networking infrastructure, facilitating communication between devices and providing internet access. The exploitation of this vulnerability could lead to unauthorized access, compromising the integrity and confidentiality of sensitive data transmitted over the network. Given the role of these devices in an organization’s IT environment, such vulnerabilities pose a significant risk to operational stability and security.
Potential impact of CVE-2026-24465
-
Arbitrary Code Execution: The primary risk is that an attacker could exploit this vulnerability to execute arbitrary code on the access point, which could allow them to manipulate network traffic, deploy additional malware, or gain access to sensitive information.
-
Network Compromise: Successful exploitation could lead to a complete compromise of the network environment. This means that attackers could potentially access all devices connected to the network, putting corporate resources, intellectual property, and sensitive data at risk.
-
Disruption of Services: The vulnerability could also lead to service disruptions. With attackers gaining control, they could disable the access point, resulting in loss of connectivity for users and impacting business operations and communications adversely.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
WAB-S300IW-AC v5.5.00 and earlier versions
WAB-S300IW-PD all versions
WAB-S300IW2-PD v5.5.00 and earlier versions
References
CVSS V4
CVSS V3.0
Timeline
Vulnerability published
Vulnerability Reserved
