Configuration file tampering in ELECOM wireless LAN access point devices
CVE-2026-25107

6.9MEDIUM

Key Information:

Vendor
CVE Published:
13 May 2026

What is CVE-2026-25107?

ELECOM wireless LAN access point devices are vulnerable due to the use of a hard-coded cryptographic key when creating backups of configuration files. This vulnerability allows an attacker, who has knowledge of the encryption key, to manipulate the configuration file. Victim administrators may unwittingly be influenced into utilizing a compromised configuration file, leading to potential unauthorized changes and network security risks.

Affected Version(s)

WRC-X1800GS-B v1.19 and earlier

WRC-X1800GSA-B v1.19 and earlier

WRC-X1800GSH-B v1.19 and earlier

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

CVSS V3.0

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.