CVE-2024-23910: Cross-site request forgery (CSRF) in ELECOM CO.,LTD. WRC-1167GS2-B
Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B".
AI Analysis
Technical Summary
CVE-2024-23910 is a cross-site request forgery (CSRF) vulnerability affecting ELECOM CO.,LTD. wireless LAN routers and repeaters, specifically the WRC-1167GS2-B model and devices included in the e-Mesh Starter Kit "WMC-2LX-B" such as WMC-X1800GST-B and WSC-X1800GS-B. The vulnerability exists in firmware versions v1.67 and earlier. CSRF vulnerabilities allow a remote attacker to trick an authenticated administrator into executing unintended commands on the device by exploiting the administrator's active session. In this case, the attacker does not require authentication or direct access to the device but can leverage the administrator’s browser session to perform unauthorized operations. This could include changing device configurations, modifying network settings, or potentially creating backdoors. The vulnerability arises because the affected devices do not properly validate the origin or authenticity of requests that perform sensitive actions, making them susceptible to malicious web pages or scripts that an administrator might visit. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical role of these devices in network infrastructure. The lack of patches or mitigation links in the provided data suggests that users should be vigilant and apply any forthcoming updates from ELECOM promptly. The vulnerability is categorized as medium severity, reflecting the moderate ease of exploitation combined with potentially impactful consequences on device integrity and network security.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized changes in network device configurations, potentially disrupting wireless network availability or compromising network security. Attackers could redirect traffic, disable security features, or create persistent access points, which could facilitate further attacks such as data interception or lateral movement within corporate networks. Given that these devices are often deployed in small to medium-sized enterprises or branch offices, exploitation could result in localized network outages or data breaches. The impact on confidentiality, integrity, and availability is moderate but significant, especially in environments where these routers serve as primary wireless gateways. Additionally, compromised devices could be leveraged as entry points into larger organizational networks, increasing the risk of broader compromise. The fact that exploitation requires an administrator to be logged in and visit a malicious site means that user interaction is necessary, somewhat limiting the attack surface but not eliminating it. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future attacks.
Mitigation Recommendations
1. Immediate mitigation should include educating administrators to avoid visiting untrusted or suspicious websites while logged into the router’s administrative interface. 2. Network segmentation can limit the exposure of management interfaces to trusted internal networks only, preventing external access to the router’s admin panel. 3. Administrators should disable remote management features if not required, reducing the attack surface. 4. Implement browser security measures such as disabling third-party cookies and using browser extensions that block CSRF attacks or malicious scripts. 5. Monitor network traffic for unusual configuration changes or unauthorized access attempts. 6. ELECOM users should regularly check for firmware updates and apply patches as soon as they become available. 7. Where possible, replace affected devices with models known to have robust CSRF protections or enhanced security features. 8. Employ multi-factor authentication (MFA) for device management interfaces if supported, to reduce the risk of session hijacking. These steps go beyond generic advice by focusing on administrative behavior, network architecture, and proactive monitoring tailored to the specific vulnerability characteristics.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2024-23910: Cross-site request forgery (CSRF) in ELECOM CO.,LTD. WRC-1167GS2-B
Description
Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B".
AI-Powered Analysis
Technical Analysis
CVE-2024-23910 is a cross-site request forgery (CSRF) vulnerability affecting ELECOM CO.,LTD. wireless LAN routers and repeaters, specifically the WRC-1167GS2-B model and devices included in the e-Mesh Starter Kit "WMC-2LX-B" such as WMC-X1800GST-B and WSC-X1800GS-B. The vulnerability exists in firmware versions v1.67 and earlier. CSRF vulnerabilities allow a remote attacker to trick an authenticated administrator into executing unintended commands on the device by exploiting the administrator's active session. In this case, the attacker does not require authentication or direct access to the device but can leverage the administrator’s browser session to perform unauthorized operations. This could include changing device configurations, modifying network settings, or potentially creating backdoors. The vulnerability arises because the affected devices do not properly validate the origin or authenticity of requests that perform sensitive actions, making them susceptible to malicious web pages or scripts that an administrator might visit. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical role of these devices in network infrastructure. The lack of patches or mitigation links in the provided data suggests that users should be vigilant and apply any forthcoming updates from ELECOM promptly. The vulnerability is categorized as medium severity, reflecting the moderate ease of exploitation combined with potentially impactful consequences on device integrity and network security.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized changes in network device configurations, potentially disrupting wireless network availability or compromising network security. Attackers could redirect traffic, disable security features, or create persistent access points, which could facilitate further attacks such as data interception or lateral movement within corporate networks. Given that these devices are often deployed in small to medium-sized enterprises or branch offices, exploitation could result in localized network outages or data breaches. The impact on confidentiality, integrity, and availability is moderate but significant, especially in environments where these routers serve as primary wireless gateways. Additionally, compromised devices could be leveraged as entry points into larger organizational networks, increasing the risk of broader compromise. The fact that exploitation requires an administrator to be logged in and visit a malicious site means that user interaction is necessary, somewhat limiting the attack surface but not eliminating it. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future attacks.
Mitigation Recommendations
1. Immediate mitigation should include educating administrators to avoid visiting untrusted or suspicious websites while logged into the router’s administrative interface. 2. Network segmentation can limit the exposure of management interfaces to trusted internal networks only, preventing external access to the router’s admin panel. 3. Administrators should disable remote management features if not required, reducing the attack surface. 4. Implement browser security measures such as disabling third-party cookies and using browser extensions that block CSRF attacks or malicious scripts. 5. Monitor network traffic for unusual configuration changes or unauthorized access attempts. 6. ELECOM users should regularly check for firmware updates and apply patches as soon as they become available. 7. Where possible, replace affected devices with models known to have robust CSRF protections or enhanced security features. 8. Employ multi-factor authentication (MFA) for device management interfaces if supported, to reduce the risk of session hijacking. These steps go beyond generic advice by focusing on administrative behavior, network architecture, and proactive monitoring tailored to the specific vulnerability characteristics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2024-02-15T01:25:06.163Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6f4b
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 7:53:08 PM
Last updated: 8/15/2025, 11:49:49 PM
Views: 10
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.