Configuration file tampering in ELECOM wireless LAN access point devices
CVE-2026-25107
6.9MEDIUM
What is CVE-2026-25107?
ELECOM wireless LAN access point devices are vulnerable due to the use of a hard-coded cryptographic key when creating backups of configuration files. This vulnerability allows an attacker, who has knowledge of the encryption key, to manipulate the configuration file. Victim administrators may unwittingly be influenced into utilizing a compromised configuration file, leading to potential unauthorized changes and network security risks.
Affected Version(s)
WRC-X1800GS-B v1.19 and earlier
WRC-X1800GSA-B v1.19 and earlier
WRC-X1800GSH-B v1.19 and earlier
References
CVSS V4
Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown
CVSS V3.0
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
