Skip to main content

CVE-2024-23910: Cross-site request forgery (CSRF) in ELECOM CO.,LTD. WRC-1167GS2-B

Medium
Published: Wed Feb 28 2024 (02/28/2024, 23:07:02 UTC)
Source: CVE
Vendor/Project: ELECOM CO.,LTD.
Product: WRC-1167GS2-B

Description

Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B".

AI-Powered Analysis

AILast updated: 06/21/2025, 19:53:08 UTC

Technical Analysis

CVE-2024-23910 is a cross-site request forgery (CSRF) vulnerability affecting ELECOM CO.,LTD. wireless LAN routers and repeaters, specifically the WRC-1167GS2-B model and devices included in the e-Mesh Starter Kit "WMC-2LX-B" such as WMC-X1800GST-B and WSC-X1800GS-B. The vulnerability exists in firmware versions v1.67 and earlier. CSRF vulnerabilities allow a remote attacker to trick an authenticated administrator into executing unintended commands on the device by exploiting the administrator's active session. In this case, the attacker does not require authentication or direct access to the device but can leverage the administrator’s browser session to perform unauthorized operations. This could include changing device configurations, modifying network settings, or potentially creating backdoors. The vulnerability arises because the affected devices do not properly validate the origin or authenticity of requests that perform sensitive actions, making them susceptible to malicious web pages or scripts that an administrator might visit. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical role of these devices in network infrastructure. The lack of patches or mitigation links in the provided data suggests that users should be vigilant and apply any forthcoming updates from ELECOM promptly. The vulnerability is categorized as medium severity, reflecting the moderate ease of exploitation combined with potentially impactful consequences on device integrity and network security.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized changes in network device configurations, potentially disrupting wireless network availability or compromising network security. Attackers could redirect traffic, disable security features, or create persistent access points, which could facilitate further attacks such as data interception or lateral movement within corporate networks. Given that these devices are often deployed in small to medium-sized enterprises or branch offices, exploitation could result in localized network outages or data breaches. The impact on confidentiality, integrity, and availability is moderate but significant, especially in environments where these routers serve as primary wireless gateways. Additionally, compromised devices could be leveraged as entry points into larger organizational networks, increasing the risk of broader compromise. The fact that exploitation requires an administrator to be logged in and visit a malicious site means that user interaction is necessary, somewhat limiting the attack surface but not eliminating it. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future attacks.

Mitigation Recommendations

1. Immediate mitigation should include educating administrators to avoid visiting untrusted or suspicious websites while logged into the router’s administrative interface. 2. Network segmentation can limit the exposure of management interfaces to trusted internal networks only, preventing external access to the router’s admin panel. 3. Administrators should disable remote management features if not required, reducing the attack surface. 4. Implement browser security measures such as disabling third-party cookies and using browser extensions that block CSRF attacks or malicious scripts. 5. Monitor network traffic for unusual configuration changes or unauthorized access attempts. 6. ELECOM users should regularly check for firmware updates and apply patches as soon as they become available. 7. Where possible, replace affected devices with models known to have robust CSRF protections or enhanced security features. 8. Employ multi-factor authentication (MFA) for device management interfaces if supported, to reduce the risk of session hijacking. These steps go beyond generic advice by focusing on administrative behavior, network architecture, and proactive monitoring tailored to the specific vulnerability characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2024-02-15T01:25:06.163Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6f4b

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 7:53:08 PM

Last updated: 8/15/2025, 11:49:49 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats