ELECOM wireless LAN access point devices use a hard-coded cryptographic key when creating backups of configuration files. An attacker who knows the encryption key can tamper the configuration file of the product, and a victim administrator may be tricked to use a crafted configuration file.
Metrics
Affected Vendors & Products
References
History
Wed, 13 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ELECOM wireless LAN access point devices use a hard-coded cryptographic key when creating backups of configuration files. An attacker who knows the encryption key can tamper the configuration file of the product, and a victim administrator may be tricked to use a crafted configuration file. | |
| Weaknesses | CWE-321 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-05-13T12:01:20.724Z
Reserved: 2026-05-07T05:47:06.075Z
Link: CVE-2026-25107
No data.
Status : Deferred
Published: 2026-05-13T13:16:37.160
Modified: 2026-05-13T15:47:10.327
Link: CVE-2026-25107
No data.
OpenCVE Enrichment
Updated: 2026-05-13T15:00:06Z