ELECOM wireless LAN access point devices contain an OS command injection in processing of username parameter. If processing a crafted request, an arbitrary OS command may be executed. No authentication is required.
History

Wed, 13 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 May 2026 14:30:00 +0000

Type Values Removed Values Added
Title Remote OS Command Injection in Elecom Wireless LAN Access Point Username Parameter

Wed, 13 May 2026 12:45:00 +0000

Type Values Removed Values Added
Description ELECOM wireless LAN access point devices contain an OS command injection in processing of username parameter. If processing a crafted request, an arbitrary OS command may be executed. No authentication is required.
Weaknesses CWE-78
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-05-13T15:07:12.520Z

Reserved: 2026-05-07T05:47:07.064Z

Link: CVE-2026-42062

cve-icon Vulnrichment

Updated: 2026-05-13T15:07:07.266Z

cve-icon NVD

Status : Deferred

Published: 2026-05-13T13:16:43.570

Modified: 2026-05-13T15:47:10.327

Link: CVE-2026-42062

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T14:30:36Z