Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34021: Unrestricted upload of file with dangerous type in ELECOM CO.,LTD. WRC-1167GST2

0
Medium
VulnerabilityCVE-2024-34021cvecve-2024-34021
Published: Thu Aug 01 2024 (08/01/2024, 01:15:56 UTC)
Source: CVE Database V5
Vendor/Project: ELECOM CO.,LTD.
Product: WRC-1167GST2

Description

Unrestricted upload of file with dangerous type vulnerability exists in ELECOM wireless LAN routers. A specially crafted file may be uploaded to the affected product by a logged-in user with an administrative privilege, resulting in an arbitrary OS command execution.

AI-Powered Analysis

AILast updated: 02/03/2026, 08:29:28 UTC

Technical Analysis

CVE-2024-34021 is a vulnerability identified in ELECOM CO.,LTD.'s WRC-1167GST2 wireless LAN routers, specifically firmware versions 1.32 and earlier. The flaw is classified under CWE-434, which pertains to unrestricted file upload vulnerabilities. In this case, the router's web interface or management system allows an authenticated user with administrative privileges to upload files without proper validation or restriction on file types. This lack of validation enables the attacker to upload specially crafted files that can trigger arbitrary operating system command execution on the device. The attack vector is network-based (AV:A), requiring the attacker to have administrative privileges (PR:H) but no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the device, as arbitrary command execution can lead to full device compromise, data leakage, or denial of service. Although no public exploits are currently known, the vulnerability presents a significant risk if exploited, especially in environments where these routers are deployed as critical network infrastructure. The vulnerability was published on August 1, 2024, and no patches have been linked yet, indicating that affected users must monitor vendor updates closely. The medium severity rating (CVSS 6.8) reflects the balance between the high impact and the requirement for administrative access. This vulnerability highlights the importance of strict file upload validation and access control in network device management interfaces.

Potential Impact

For European organizations, exploitation of CVE-2024-34021 could lead to severe consequences including unauthorized control over wireless LAN routers, which are often integral to network connectivity and security. Attackers gaining arbitrary OS command execution could intercept or manipulate network traffic, deploy malware, pivot to internal systems, or disrupt network availability. This could compromise sensitive data confidentiality and integrity, especially in sectors like finance, healthcare, and government where secure communications are critical. The requirement for administrative privileges limits the attack surface but insider threats or compromised credentials could facilitate exploitation. Additionally, compromised routers could serve as footholds for broader attacks against enterprise networks. The lack of current public exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits rapidly after disclosure. Organizations relying on ELECOM WRC-1167GST2 routers should consider the vulnerability a significant risk to their network infrastructure security.

Mitigation Recommendations

1. Monitor ELECOM's official channels for firmware updates addressing CVE-2024-34021 and apply patches promptly once available. 2. Restrict administrative access to the router management interface using network segmentation, VPNs, or IP whitelisting to minimize exposure. 3. Enforce strong, unique administrative credentials and implement multi-factor authentication if supported. 4. Disable or limit file upload capabilities in the router's management interface if possible until a patch is applied. 5. Conduct regular audits of router configurations and logs to detect unauthorized access or suspicious file uploads. 6. Employ network intrusion detection systems (NIDS) to monitor for anomalous activities related to router management traffic. 7. Consider replacing affected devices with models from vendors with stronger security track records if patching is delayed. 8. Educate network administrators about the risks of this vulnerability and the importance of credential security to prevent insider exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2024-07-26T08:52:16.452Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6981ae8df9fa50a62faf0c0d

Added to database: 2/3/2026, 8:15:09 AM

Last enriched: 2/3/2026, 8:29:28 AM

Last updated: 2/3/2026, 9:17:07 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats