ELECOM wireless LAN access point devices contain an OS command injection vulnerability in processing of ping_ip_addr parameter. If processing a crafted request sent by a logged-in user, an arbitrary OS command may be executed.
History

Wed, 13 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 May 2026 14:30:00 +0000

Type Values Removed Values Added
Title OS Command Injection via Ping IP Address Parameter in ELECOM Wireless LAN Access Points

Wed, 13 May 2026 12:45:00 +0000

Type Values Removed Values Added
Description ELECOM wireless LAN access point devices contain an OS command injection vulnerability in processing of ping_ip_addr parameter. If processing a crafted request sent by a logged-in user, an arbitrary OS command may be executed.
Weaknesses CWE-78
References
Metrics cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-05-13T15:19:45.905Z

Reserved: 2026-05-07T05:47:11.955Z

Link: CVE-2026-35506

cve-icon Vulnrichment

Updated: 2026-05-13T15:19:08.993Z

cve-icon NVD

Status : Deferred

Published: 2026-05-13T13:16:40.880

Modified: 2026-05-13T15:47:10.327

Link: CVE-2026-35506

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T14:30:36Z