OS Command Injection Vulnerability in ELECOM Wireless LAN Access Point
CVE-2026-42062
9.3CRITICAL
What is CVE-2026-42062?
ELECOM wireless LAN access point devices have a vulnerability in their processing of the username parameter, which allows for OS command injection. An attacker can exploit this flaw by sending a specially crafted request, which can result in the execution of arbitrary OS commands on the device without requiring authentication. This presents a significant security risk as it can compromise the integrity and functionality of the affected devices.
Affected Version(s)
WRC-BE65QSD-B v1.1.0 and earlier
WRC-BE72XSD-B v1.1.1 and earlier
WRC-BE72XSD-BA v1.1.1 and earlier
References
CVSS V4
Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
CVSS V3.0
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
