CVE-2024-25579: OS command injection in ELECOM CO.,LTD. WRC-1167GS2-B
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
AI Analysis
Technical Summary
CVE-2024-25579 is an OS command injection vulnerability identified in ELECOM CO.,LTD.'s wireless LAN routers, notably the WRC-1167GS2-B and the WMC-X1800GST-B (part of the e-Mesh Starter Kit WMC-2LX-B). This vulnerability arises from improper input validation in the router's web management interface or network service, allowing an attacker with administrative privileges on the network to inject and execute arbitrary operating system commands. The attack vector is network-adjacent, meaning the attacker must have some level of network access but does not require physical access. The vulnerability affects firmware versions v1.67 and earlier. The CVSS 3.0 base score is 6.8, reflecting a medium severity with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The attack complexity is low, but the prerequisite of administrative privileges reduces the likelihood of exploitation by unauthorized users. There is no requirement for user interaction, and the scope is unchanged, meaning the impact is confined to the vulnerable device. No public patches or known exploits have been reported yet. The CWE classification is CWE-78, which corresponds to OS command injection, a critical class of vulnerabilities that can lead to full system compromise if exploited. This vulnerability could allow attackers to manipulate router configurations, intercept or redirect traffic, or disrupt network availability.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to significant security breaches, including unauthorized access to sensitive network configurations, interception or manipulation of network traffic, and potential disruption of network services. Given that the vulnerability requires administrative privileges, the primary risk is insider threats or attackers who have already gained elevated access within the network. Compromise of these routers could facilitate lateral movement within corporate networks, data exfiltration, or deployment of further malware. Organizations relying on these ELECOM router models for critical network infrastructure, especially in sectors like finance, healthcare, or government, could face operational disruptions and data breaches. The impact on confidentiality, integrity, and availability is high, potentially affecting business continuity and regulatory compliance under GDPR if personal data is exposed or network integrity is compromised.
Mitigation Recommendations
European organizations should immediately audit their network environments to identify the presence of affected ELECOM router models (WRC-1167GS2-B and WMC-X1800GST-B). Until official patches are released, organizations should restrict administrative access to these devices by limiting management interfaces to trusted IP addresses or VLANs and enforcing strong authentication mechanisms. Network segmentation should be employed to isolate these routers from untrusted or less secure network segments. Monitoring and logging of administrative access and unusual command executions on these devices should be enhanced to detect potential exploitation attempts. Firmware should be updated to the latest version as soon as ELECOM releases a patch addressing this vulnerability. Additionally, organizations should consider deploying network intrusion detection systems (NIDS) capable of identifying anomalous traffic patterns indicative of command injection attempts. Regular security training for administrators to recognize and report suspicious activity is also recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-25579: OS command injection in ELECOM CO.,LTD. WRC-1167GS2-B
Description
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
AI-Powered Analysis
Technical Analysis
CVE-2024-25579 is an OS command injection vulnerability identified in ELECOM CO.,LTD.'s wireless LAN routers, notably the WRC-1167GS2-B and the WMC-X1800GST-B (part of the e-Mesh Starter Kit WMC-2LX-B). This vulnerability arises from improper input validation in the router's web management interface or network service, allowing an attacker with administrative privileges on the network to inject and execute arbitrary operating system commands. The attack vector is network-adjacent, meaning the attacker must have some level of network access but does not require physical access. The vulnerability affects firmware versions v1.67 and earlier. The CVSS 3.0 base score is 6.8, reflecting a medium severity with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The attack complexity is low, but the prerequisite of administrative privileges reduces the likelihood of exploitation by unauthorized users. There is no requirement for user interaction, and the scope is unchanged, meaning the impact is confined to the vulnerable device. No public patches or known exploits have been reported yet. The CWE classification is CWE-78, which corresponds to OS command injection, a critical class of vulnerabilities that can lead to full system compromise if exploited. This vulnerability could allow attackers to manipulate router configurations, intercept or redirect traffic, or disrupt network availability.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to significant security breaches, including unauthorized access to sensitive network configurations, interception or manipulation of network traffic, and potential disruption of network services. Given that the vulnerability requires administrative privileges, the primary risk is insider threats or attackers who have already gained elevated access within the network. Compromise of these routers could facilitate lateral movement within corporate networks, data exfiltration, or deployment of further malware. Organizations relying on these ELECOM router models for critical network infrastructure, especially in sectors like finance, healthcare, or government, could face operational disruptions and data breaches. The impact on confidentiality, integrity, and availability is high, potentially affecting business continuity and regulatory compliance under GDPR if personal data is exposed or network integrity is compromised.
Mitigation Recommendations
European organizations should immediately audit their network environments to identify the presence of affected ELECOM router models (WRC-1167GS2-B and WMC-X1800GST-B). Until official patches are released, organizations should restrict administrative access to these devices by limiting management interfaces to trusted IP addresses or VLANs and enforcing strong authentication mechanisms. Network segmentation should be employed to isolate these routers from untrusted or less secure network segments. Monitoring and logging of administrative access and unusual command executions on these devices should be enhanced to detect potential exploitation attempts. Firmware should be updated to the latest version as soon as ELECOM releases a patch addressing this vulnerability. Additionally, organizations should consider deploying network intrusion detection systems (NIDS) capable of identifying anomalous traffic patterns indicative of command injection attempts. Regular security training for administrators to recognize and report suspicious activity is also recommended.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jpcert
- Date Reserved
- 2024-02-15T01:25:08.855Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 6981ae8df9fa50a62faf0c09
Added to database: 2/3/2026, 8:15:09 AM
Last enriched: 2/3/2026, 8:29:40 AM
Last updated: 2/3/2026, 9:16:45 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8461: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Seres Software syWEB
HighResearchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
MediumCVE-2025-8456: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website
HighCVE-2024-34021: Unrestricted upload of file with dangerous type in ELECOM CO.,LTD. WRC-1167GST2
MediumCVE-2026-1592: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.