Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25579: OS command injection in ELECOM CO.,LTD. WRC-1167GS2-B

0
Medium
VulnerabilityCVE-2024-25579cvecve-2024-25579
Published: Wed Feb 28 2024 (02/28/2024, 23:08:49 UTC)
Source: CVE Database V5
Vendor/Project: ELECOM CO.,LTD.
Product: WRC-1167GS2-B

Description

OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".

AI-Powered Analysis

AILast updated: 02/03/2026, 08:29:40 UTC

Technical Analysis

CVE-2024-25579 is an OS command injection vulnerability identified in ELECOM CO.,LTD.'s wireless LAN routers, notably the WRC-1167GS2-B and the WMC-X1800GST-B (part of the e-Mesh Starter Kit WMC-2LX-B). This vulnerability arises from improper input validation in the router's web management interface or network service, allowing an attacker with administrative privileges on the network to inject and execute arbitrary operating system commands. The attack vector is network-adjacent, meaning the attacker must have some level of network access but does not require physical access. The vulnerability affects firmware versions v1.67 and earlier. The CVSS 3.0 base score is 6.8, reflecting a medium severity with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The attack complexity is low, but the prerequisite of administrative privileges reduces the likelihood of exploitation by unauthorized users. There is no requirement for user interaction, and the scope is unchanged, meaning the impact is confined to the vulnerable device. No public patches or known exploits have been reported yet. The CWE classification is CWE-78, which corresponds to OS command injection, a critical class of vulnerabilities that can lead to full system compromise if exploited. This vulnerability could allow attackers to manipulate router configurations, intercept or redirect traffic, or disrupt network availability.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to significant security breaches, including unauthorized access to sensitive network configurations, interception or manipulation of network traffic, and potential disruption of network services. Given that the vulnerability requires administrative privileges, the primary risk is insider threats or attackers who have already gained elevated access within the network. Compromise of these routers could facilitate lateral movement within corporate networks, data exfiltration, or deployment of further malware. Organizations relying on these ELECOM router models for critical network infrastructure, especially in sectors like finance, healthcare, or government, could face operational disruptions and data breaches. The impact on confidentiality, integrity, and availability is high, potentially affecting business continuity and regulatory compliance under GDPR if personal data is exposed or network integrity is compromised.

Mitigation Recommendations

European organizations should immediately audit their network environments to identify the presence of affected ELECOM router models (WRC-1167GS2-B and WMC-X1800GST-B). Until official patches are released, organizations should restrict administrative access to these devices by limiting management interfaces to trusted IP addresses or VLANs and enforcing strong authentication mechanisms. Network segmentation should be employed to isolate these routers from untrusted or less secure network segments. Monitoring and logging of administrative access and unusual command executions on these devices should be enhanced to detect potential exploitation attempts. Firmware should be updated to the latest version as soon as ELECOM releases a patch addressing this vulnerability. Additionally, organizations should consider deploying network intrusion detection systems (NIDS) capable of identifying anomalous traffic patterns indicative of command injection attempts. Regular security training for administrators to recognize and report suspicious activity is also recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2024-02-15T01:25:08.855Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6981ae8df9fa50a62faf0c09

Added to database: 2/3/2026, 8:15:09 AM

Last enriched: 2/3/2026, 8:29:40 AM

Last updated: 2/3/2026, 9:16:45 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats