OS Command Injection Vulnerability in ELECOM Wireless LAN Access Point
CVE-2026-42062

9.3CRITICAL

Key Information:

Vendor
CVE Published:
13 May 2026

What is CVE-2026-42062?

ELECOM wireless LAN access point devices have a vulnerability in their processing of the username parameter, which allows for OS command injection. An attacker can exploit this flaw by sending a specially crafted request, which can result in the execution of arbitrary OS commands on the device without requiring authentication. This presents a significant security risk as it can compromise the integrity and functionality of the affected devices.

Affected Version(s)

WRC-BE65QSD-B v1.1.0 and earlier

WRC-BE72XSD-B v1.1.1 and earlier

WRC-BE72XSD-BA v1.1.1 and earlier

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

CVSS V3.0

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.